General
-
Target
ff46ba0b89f1887db1caa1fb8e369c959eff4c112be547d8c7a39a1a3394fe22
-
Size
1009KB
-
Sample
231207-c8jmqaaeb7
-
MD5
57e91f23b1ca539d16f25383733b5565
-
SHA1
6aa28303dd0f9dd87b286f7725de05e4dbae50b6
-
SHA256
ff46ba0b89f1887db1caa1fb8e369c959eff4c112be547d8c7a39a1a3394fe22
-
SHA512
c86f14ea08d3e0d2083f92272f6d27973478000576403ce56cb488bc6c3da9e6a0b120bbfc1c7e86b14b5c80e0b5d2b76b1f365289d8601a43a93e149ae17ac4
-
SSDEEP
12288:MdIUTZRHiGs2cFVsDv04+R3ZCxTDqqc8lgExRw1:MBZoGbfv/+R3ZoTDLFlgSy1
Static task
static1
Behavioral task
behavioral1
Sample
ff46ba0b89f1887db1caa1fb8e369c959eff4c112be547d8c7a39a1a3394fe22.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ff46ba0b89f1887db1caa1fb8e369c959eff4c112be547d8c7a39a1a3394fe22.exe
Resource
win10v2004-20231201-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1179011823245217852/BApmSysJ7ds4rFscxhzRAHKJv1hyP1UFKhyfN1ojsei9HMF0L9z-hwZZiDIGOsncVkXv
Targets
-
-
Target
ff46ba0b89f1887db1caa1fb8e369c959eff4c112be547d8c7a39a1a3394fe22
-
Size
1009KB
-
MD5
57e91f23b1ca539d16f25383733b5565
-
SHA1
6aa28303dd0f9dd87b286f7725de05e4dbae50b6
-
SHA256
ff46ba0b89f1887db1caa1fb8e369c959eff4c112be547d8c7a39a1a3394fe22
-
SHA512
c86f14ea08d3e0d2083f92272f6d27973478000576403ce56cb488bc6c3da9e6a0b120bbfc1c7e86b14b5c80e0b5d2b76b1f365289d8601a43a93e149ae17ac4
-
SSDEEP
12288:MdIUTZRHiGs2cFVsDv04+R3ZCxTDqqc8lgExRw1:MBZoGbfv/+R3ZoTDLFlgSy1
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-