General
-
Target
03549299.exe
-
Size
787KB
-
Sample
230528-km7resfb6z
-
MD5
4856aa91b3b25dc702acee5419906c0d
-
SHA1
ede60a132a27265595f8744a44ea13f371357d08
-
SHA256
0140ef4dd7bd4b560548e2b9f74ae66006efc7d0e0b3b017251f755bbd8b601c
-
SHA512
eb74fa093c1ae40ce7cdb51fa0afbb7f849f90e496ce6bac0732dfe6a9307c28fdb1ab953e4b732b358a8fe6597a2937f6ab5b211cc3e5a6305dfe48bc0189d5
-
SSDEEP
12288:TJas7z5GoJiGaq5aulLfqPoSCccNJzT5Fkjy6v6z4TgnnFxZAY6gvCd41x:I65GoR5ambqPo7Bk+6v6kTgFxiVd41
Static task
static1
Behavioral task
behavioral1
Sample
03549299.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
03549299.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocument
Targets
-
-
Target
03549299.exe
-
Size
787KB
-
MD5
4856aa91b3b25dc702acee5419906c0d
-
SHA1
ede60a132a27265595f8744a44ea13f371357d08
-
SHA256
0140ef4dd7bd4b560548e2b9f74ae66006efc7d0e0b3b017251f755bbd8b601c
-
SHA512
eb74fa093c1ae40ce7cdb51fa0afbb7f849f90e496ce6bac0732dfe6a9307c28fdb1ab953e4b732b358a8fe6597a2937f6ab5b211cc3e5a6305dfe48bc0189d5
-
SSDEEP
12288:TJas7z5GoJiGaq5aulLfqPoSCccNJzT5Fkjy6v6z4TgnnFxZAY6gvCd41x:I65GoR5ambqPo7Bk+6v6kTgFxiVd41
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-