General
-
Target
202312056738819991.cab
-
Size
543KB
-
Sample
230512-rlgl6sfe9s
-
MD5
020f986ac3ab78eaaf96c5c3cd1ffe9a
-
SHA1
e6868b55afbc3279ae4cd81ae9a9528ac2063b99
-
SHA256
ab3a14156bf77a335fa00fddeeb80393948d4ddf79c3b69567cedb1446d2d47b
-
SHA512
c8b0e2a5c2536ed083a6017e4426c8e0c1780214f0cf0c5f0abb89da747bac3a044bb793bfdec01b0a7b55ed65a3f67f53afdb6d66e2fe581363aeea518045dd
-
SSDEEP
12288:w2UNUXykWdQhHaO9U/5xq0OtpCnXu5AIHh1ffZbvIldVSzjWXWbB:w2UKXykWdQhj9UBH+5IldVUjX
Static task
static1
Behavioral task
behavioral1
Sample
COCAzzeZ6x9Wl4s.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
COCAzzeZ6x9Wl4s.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5798024834:AAGLHTcPdLDij7ehMoasiBZDz8oodefEy0E/
Targets
-
-
Target
COCAzzeZ6x9Wl4s.exe
-
Size
618KB
-
MD5
68b5135a9c650f960d63ba7a72171cef
-
SHA1
4d6df7a7614241a16da91a7adfaf9b221fd1d459
-
SHA256
4dd61508d7da8e65625587543e0ee0ec49e848a45999ee148c9ca1a6bd1a419f
-
SHA512
e2cffbf699b6d795a9c1e2612b21efa95c32f8b0dde2f0078e5edbe145eee187b169e572c0dc5d395772bf7fbcfc4c73be89ad77444f5c70fa33cbcef27f063a
-
SSDEEP
12288:+c8whh2Y4YxPdQhX7Fw9HvubAIQh1lfzbvEldV99NCeDwTAVO:78whh2gPdQhXZAm0EldV99nwT9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-