General
-
Target
d5e90ce1f8eb541722c1fca05abb1f729b7a886c44c9aa93b1477a6183c9476e
-
Size
728KB
-
Sample
230530-hh6bpagb21
-
MD5
b63a30317660234ab69e300dde19bf68
-
SHA1
58e25594971ff45c369ca6d3fa27abb530ff6bcd
-
SHA256
d5e90ce1f8eb541722c1fca05abb1f729b7a886c44c9aa93b1477a6183c9476e
-
SHA512
bc336431930ed11d9e0335698b6e12c4329bd875e863b20a772e1b0237109844ba870fd8c82732c4dc0baed0ecfbac4487593dbae80fb64f67b4152f4e35ca75
-
SSDEEP
12288:w2RP2B0xTGlxNqvNu2hZ+nUEsn9gIGFJTYpN0c5dkHBo7GWYJsmya+gxsB7nLu5p:wOPLaVUH999wFVgNOBo7GWYJRKBz6b
Static task
static1
Behavioral task
behavioral1
Sample
d5e90ce1f8eb541722c1fca05abb1f729b7a886c44c9aa93b1477a6183c9476e.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6266541527:AAGUIaxxki9JzGK-5gIHA-c2WFvuGVYdq4k/
Targets
-
-
Target
d5e90ce1f8eb541722c1fca05abb1f729b7a886c44c9aa93b1477a6183c9476e
-
Size
728KB
-
MD5
b63a30317660234ab69e300dde19bf68
-
SHA1
58e25594971ff45c369ca6d3fa27abb530ff6bcd
-
SHA256
d5e90ce1f8eb541722c1fca05abb1f729b7a886c44c9aa93b1477a6183c9476e
-
SHA512
bc336431930ed11d9e0335698b6e12c4329bd875e863b20a772e1b0237109844ba870fd8c82732c4dc0baed0ecfbac4487593dbae80fb64f67b4152f4e35ca75
-
SSDEEP
12288:w2RP2B0xTGlxNqvNu2hZ+nUEsn9gIGFJTYpN0c5dkHBo7GWYJsmya+gxsB7nLu5p:wOPLaVUH999wFVgNOBo7GWYJRKBz6b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-