General
-
Target
dab636a81ff0ed263531e7984977366336b9f194c170406c8b145db5711c9d8e
-
Size
792KB
-
Sample
230608-pv75dafd45
-
MD5
b038b4d1fbbab60fc94b46d6e244932c
-
SHA1
cecbc91cddb4451de243f5a07cea733c994ceec4
-
SHA256
dab636a81ff0ed263531e7984977366336b9f194c170406c8b145db5711c9d8e
-
SHA512
e9da36d4cf4e2b8369fd368a4fc7fc6408b8f8030860b67cc5f9f082f3dfcd59c61f56c4679c9465a24b43a7deb471971f47706927d0f135bc2276400238d751
-
SSDEEP
12288:s/2B0xTGlxNqvNu2hZ+nUEsn9tyNSJCbqixpDvYp11z3NBWXKxVx4ra4yjSqTvFC:s/LaVUH999ggCbqijsRz3yrdyWW/s
Static task
static1
Behavioral task
behavioral1
Sample
dab636a81ff0ed263531e7984977366336b9f194c170406c8b145db5711c9d8e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dab636a81ff0ed263531e7984977366336b9f194c170406c8b145db5711c9d8e.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5607774642:AAHvNRvZZsOklHgBMuIBbK4hzkG26fMwVX8/
Targets
-
-
Target
dab636a81ff0ed263531e7984977366336b9f194c170406c8b145db5711c9d8e
-
Size
792KB
-
MD5
b038b4d1fbbab60fc94b46d6e244932c
-
SHA1
cecbc91cddb4451de243f5a07cea733c994ceec4
-
SHA256
dab636a81ff0ed263531e7984977366336b9f194c170406c8b145db5711c9d8e
-
SHA512
e9da36d4cf4e2b8369fd368a4fc7fc6408b8f8030860b67cc5f9f082f3dfcd59c61f56c4679c9465a24b43a7deb471971f47706927d0f135bc2276400238d751
-
SSDEEP
12288:s/2B0xTGlxNqvNu2hZ+nUEsn9tyNSJCbqixpDvYp11z3NBWXKxVx4ra4yjSqTvFC:s/LaVUH999ggCbqijsRz3yrdyWW/s
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-