General
-
Target
774acfc7dde64a61752bacbab9f4dc9702dc52a90ee4915b18178c39cbe55e85
-
Size
929KB
-
Sample
230607-waqsxsec6v
-
MD5
b06ae1e6eeceff98d9996b7672219b4c
-
SHA1
14a5e0901d86ce08420c4895218de9d9bded680f
-
SHA256
774acfc7dde64a61752bacbab9f4dc9702dc52a90ee4915b18178c39cbe55e85
-
SHA512
f2811d4a346cb2e8aaf63932a6b7194654f03bcf0479f18c7142c07d7af920b3d07632dc3e34a8f1db53655707c23828f6e6b6a6a305550bbf6e12cf54b2db71
-
SSDEEP
24576:p1Bs0qZ4zlRdHZm7jNTP73VRe4P+JuleeTf7:pDs0qZW7ZmFRRvPXD
Static task
static1
Behavioral task
behavioral1
Sample
774acfc7dde64a61752bacbab9f4dc9702dc52a90ee4915b18178c39cbe55e85.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
774acfc7dde64a61752bacbab9f4dc9702dc52a90ee4915b18178c39cbe55e85.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot2124462934:AAGr-L06waDdFGpnKJz3_DCOFcJpWDQ7WIM/sendDocument
Targets
-
-
Target
774acfc7dde64a61752bacbab9f4dc9702dc52a90ee4915b18178c39cbe55e85
-
Size
929KB
-
MD5
b06ae1e6eeceff98d9996b7672219b4c
-
SHA1
14a5e0901d86ce08420c4895218de9d9bded680f
-
SHA256
774acfc7dde64a61752bacbab9f4dc9702dc52a90ee4915b18178c39cbe55e85
-
SHA512
f2811d4a346cb2e8aaf63932a6b7194654f03bcf0479f18c7142c07d7af920b3d07632dc3e34a8f1db53655707c23828f6e6b6a6a305550bbf6e12cf54b2db71
-
SSDEEP
24576:p1Bs0qZ4zlRdHZm7jNTP73VRe4P+JuleeTf7:pDs0qZW7ZmFRRvPXD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-