General
-
Target
5295920189b7b8e0e351623f7f19e5be7d6a7b1b3ff6d93a7d82fd8e7b6171f5
-
Size
331KB
-
Sample
231206-dtbt1aaf72
-
MD5
5c39961885e52459cec57d636e677a4b
-
SHA1
e4b7ea58ebf86676e3d75276c087e67b9db18c79
-
SHA256
5295920189b7b8e0e351623f7f19e5be7d6a7b1b3ff6d93a7d82fd8e7b6171f5
-
SHA512
3efeb404674d281da7cd37f50fc941c2a6dbf978fdf3cf476027aa4d712925a4df4ccf04ebd34be741df2751fa54a08184586ee020a2a3ca88a36de174df9f00
-
SSDEEP
6144:sdIMypKEs7ONlTmN+uW899vMe80K3XYLvEmlq+YhE900drZNgvcAJD2A9vLaiq:sWMm6OqN+uW8DUOPq+Yq00drH0c6D2Qg
Static task
static1
Behavioral task
behavioral1
Sample
5295920189b7b8e0e351623f7f19e5be7d6a7b1b3ff6d93a7d82fd8e7b6171f5.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
5295920189b7b8e0e351623f7f19e5be7d6a7b1b3ff6d93a7d82fd8e7b6171f5.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6526931124:AAEXW7ttfqD6dGnXHiwk28KBrXl6UbDF898/
Targets
-
-
Target
5295920189b7b8e0e351623f7f19e5be7d6a7b1b3ff6d93a7d82fd8e7b6171f5
-
Size
331KB
-
MD5
5c39961885e52459cec57d636e677a4b
-
SHA1
e4b7ea58ebf86676e3d75276c087e67b9db18c79
-
SHA256
5295920189b7b8e0e351623f7f19e5be7d6a7b1b3ff6d93a7d82fd8e7b6171f5
-
SHA512
3efeb404674d281da7cd37f50fc941c2a6dbf978fdf3cf476027aa4d712925a4df4ccf04ebd34be741df2751fa54a08184586ee020a2a3ca88a36de174df9f00
-
SSDEEP
6144:sdIMypKEs7ONlTmN+uW899vMe80K3XYLvEmlq+YhE900drZNgvcAJD2A9vLaiq:sWMm6OqN+uW8DUOPq+Yq00drH0c6D2Qg
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-