General
-
Target
47ed88823536ce7e042463d77c5bf6a99b27fe796df40b72c7dce920bfc947fb
-
Size
759KB
-
Sample
230529-fxr2haab8x
-
MD5
b57997c4724b988c46d1d279b02b14b0
-
SHA1
a1574cdb43c992003ee29c7dddf204104ff9a11b
-
SHA256
47ed88823536ce7e042463d77c5bf6a99b27fe796df40b72c7dce920bfc947fb
-
SHA512
afcf5f020ff36175feb7035c2ec4d48e22ee375c212c665b54ef49614abd2b761a3a2fc77a484561e1d268e90ac9af17cb3b6ccd2fd7b6ef2272addc1247c03a
-
SSDEEP
12288:JuHkmFx2iqNhujGjUEg7iFC9S48smFsmuM15MTGuGOyHeKxIf2TV2C3T3ZiNXEjb:MEmFxU2UG/mFsmTzMTjy+wIf27FLggXr
Static task
static1
Behavioral task
behavioral1
Sample
47ed88823536ce7e042463d77c5bf6a99b27fe796df40b72c7dce920bfc947fb.exe
Resource
win10-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocument
Targets
-
-
Target
47ed88823536ce7e042463d77c5bf6a99b27fe796df40b72c7dce920bfc947fb
-
Size
759KB
-
MD5
b57997c4724b988c46d1d279b02b14b0
-
SHA1
a1574cdb43c992003ee29c7dddf204104ff9a11b
-
SHA256
47ed88823536ce7e042463d77c5bf6a99b27fe796df40b72c7dce920bfc947fb
-
SHA512
afcf5f020ff36175feb7035c2ec4d48e22ee375c212c665b54ef49614abd2b761a3a2fc77a484561e1d268e90ac9af17cb3b6ccd2fd7b6ef2272addc1247c03a
-
SSDEEP
12288:JuHkmFx2iqNhujGjUEg7iFC9S48smFsmuM15MTGuGOyHeKxIf2TV2C3T3ZiNXEjb:MEmFxU2UG/mFsmTzMTjy+wIf27FLggXr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-