General
-
Target
FedEx_AWB#50291274643.exe
-
Size
668KB
-
Sample
230824-lssecsdb2y
-
MD5
3ab73847b24790e2ace8b72294da7eed
-
SHA1
3786111895c7b6ca58f3c90b08e5bfce610ff8e8
-
SHA256
f7531ebec6015698d037d4d8f66128e138e11d86a3901976001a4060ce90340a
-
SHA512
21bc52e0babcac56c2e84c42adb64d325b20158bc9bdad73ea228a1e9b47ffed7d3921f60dedce6a235df59dc97d934a01e82d4f2b2fe1503bdd0b52b569979e
-
SSDEEP
12288:74Xs2d1mbTIVOagBNUwGuMJ5bi9MfusTq02oUIX2CWW9mHVeL+2:jIbm8yMfZw5tCWW
Static task
static1
Behavioral task
behavioral1
Sample
FedEx_AWB#50291274643.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
FedEx_AWB#50291274643.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1135840424859291780/V-0hn2BLhBxs5lbVd7TpE9uBVTQunQxL6lrff4gbNWJqdWf14yU37Zp4g1OO7C8FOEK4
Targets
-
-
Target
FedEx_AWB#50291274643.exe
-
Size
668KB
-
MD5
3ab73847b24790e2ace8b72294da7eed
-
SHA1
3786111895c7b6ca58f3c90b08e5bfce610ff8e8
-
SHA256
f7531ebec6015698d037d4d8f66128e138e11d86a3901976001a4060ce90340a
-
SHA512
21bc52e0babcac56c2e84c42adb64d325b20158bc9bdad73ea228a1e9b47ffed7d3921f60dedce6a235df59dc97d934a01e82d4f2b2fe1503bdd0b52b569979e
-
SSDEEP
12288:74Xs2d1mbTIVOagBNUwGuMJ5bi9MfusTq02oUIX2CWW9mHVeL+2:jIbm8yMfZw5tCWW
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-