General
-
Target
2cd8bNI2Q8OjPmz.rar
-
Size
630KB
-
Sample
231012-qqj3esbg31
-
MD5
3c91ba35ae61223001a2d341fcafec9a
-
SHA1
11af34cf012d4bea7aafb749da43c0efdb982f28
-
SHA256
ee9d2238e5ad0af5b8ec9d18d1d8f08811adb00adac338082e68dcaa34689300
-
SHA512
66a0d983ee25a3d0b74341a7090b42da46bfdfcacb78337d843b29526cfab92e4a01d048c134d2cb9617ead6f1fcb7832472db1b33b60cb12cde2aac9982b50c
-
SSDEEP
12288:nCGJm5DtbloAiStVgdcXGigpAp9xKU3o7OtI0MYMzulNuQwJw/c6qujhEFh8GwDB:n9c7bloAiSIdHrpa2h6q0MCwJwER+uFs
Static task
static1
Behavioral task
behavioral1
Sample
2cd8bNI2Q8OjPmz.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2cd8bNI2Q8OjPmz.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1149008875278827590/cDePfZzx0LuY-zsiPElF0EyHtUrwRcqr7nFc5Cn0Z6UPWroO_adKQZCisnYtu09CBl3e
Targets
-
-
Target
2cd8bNI2Q8OjPmz.exe
-
Size
981KB
-
MD5
3de07ffe868ada1a96711d2b4220e5c8
-
SHA1
743995cb278684b37e915910149078e87c57359e
-
SHA256
346bcb7c4e51ec2d4555b72eac33096db6e58f3290d3c0c9e26b6e516912fafa
-
SHA512
902aaf0e52baaf6fda66e167acf03ee8bfe54d1479cede44c898142f35b271ea24b915908a87ee5e44cee16117ebaa9ab1b591fc5e508afb296842747c605a7f
-
SSDEEP
24576:Og9btzessOwlK4MbRzq3Y/ZUqMuO7tpXATRY4BY:Ogi5JMhq3Y/ZUr/XWY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-