General
-
Target
36d38c25d2449165ae6dd812089dde3d0d6bf1082d82085eda6577f4081adc18
-
Size
697KB
-
Sample
231207-czst2aghck
-
MD5
428de8501902b5c12a52e5650a85342f
-
SHA1
8466717a83df94a93546ff03661325d61be15b1c
-
SHA256
36d38c25d2449165ae6dd812089dde3d0d6bf1082d82085eda6577f4081adc18
-
SHA512
830ee4cce3a49f459d4b90db407488634441af4c4fb6fdf8c2f7ae3bc6b78c62235d92cfe6f5b6e981d170bc41040e58526e1085274f793cc5ed9e079e7ae4d8
-
SSDEEP
12288:WueH5qw7ggFvZ04wURcboTMAtPTiqRWNbm8GezJaTTVJJ6qmUkiH7I:6qg5v64VKoTJ8OWNKvAMTd1mpibI
Static task
static1
Behavioral task
behavioral1
Sample
36d38c25d2449165ae6dd812089dde3d0d6bf1082d82085eda6577f4081adc18.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
36d38c25d2449165ae6dd812089dde3d0d6bf1082d82085eda6577f4081adc18.exe
Resource
win10v2004-20231201-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1181759713713602600/iHsQ6OYa_KMNpOIA7OYiDu7j9BWVVvJ0gcEWr8VRve7tDH1TR5LRILIK1jr1NG5T-29a
Targets
-
-
Target
36d38c25d2449165ae6dd812089dde3d0d6bf1082d82085eda6577f4081adc18
-
Size
697KB
-
MD5
428de8501902b5c12a52e5650a85342f
-
SHA1
8466717a83df94a93546ff03661325d61be15b1c
-
SHA256
36d38c25d2449165ae6dd812089dde3d0d6bf1082d82085eda6577f4081adc18
-
SHA512
830ee4cce3a49f459d4b90db407488634441af4c4fb6fdf8c2f7ae3bc6b78c62235d92cfe6f5b6e981d170bc41040e58526e1085274f793cc5ed9e079e7ae4d8
-
SSDEEP
12288:WueH5qw7ggFvZ04wURcboTMAtPTiqRWNbm8GezJaTTVJJ6qmUkiH7I:6qg5v64VKoTJ8OWNKvAMTd1mpibI
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-