General
-
Target
62aa587a79fc01b534bc78f2fd609434841c9933056ff90a985883f1b02be5a5
-
Size
1.0MB
-
Sample
231208-cmj2csgf79
-
MD5
699903a49141a073a22b16c3da6207d0
-
SHA1
084748c6df44572f1e99b91f5fbb23d409235634
-
SHA256
62aa587a79fc01b534bc78f2fd609434841c9933056ff90a985883f1b02be5a5
-
SHA512
06ced7a5965e5310b8a5fccc1dbbc080d4d69f4fd066eb9a949c5a84258831154eb90ff53cce95185b081688ac09202ddb80506ddb35292d77660fc1fb9506b2
-
SSDEEP
12288:KGKhkZ5gQ6rESOfMKTpTuwY1Et8sZHnFgEOeCRhUG5Kx:K/K/gQEaM8pTuwY1EGSlgEOeCAGi
Static task
static1
Behavioral task
behavioral1
Sample
62aa587a79fc01b534bc78f2fd609434841c9933056ff90a985883f1b02be5a5.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
62aa587a79fc01b534bc78f2fd609434841c9933056ff90a985883f1b02be5a5.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1181859667215929344/76vl_7aOTygS-NmiDedmxAMqhQbcVBEgBRAMBgeUoQ2nlNXWg1w9drgrEy_mjWP5_W7M
Targets
-
-
Target
62aa587a79fc01b534bc78f2fd609434841c9933056ff90a985883f1b02be5a5
-
Size
1.0MB
-
MD5
699903a49141a073a22b16c3da6207d0
-
SHA1
084748c6df44572f1e99b91f5fbb23d409235634
-
SHA256
62aa587a79fc01b534bc78f2fd609434841c9933056ff90a985883f1b02be5a5
-
SHA512
06ced7a5965e5310b8a5fccc1dbbc080d4d69f4fd066eb9a949c5a84258831154eb90ff53cce95185b081688ac09202ddb80506ddb35292d77660fc1fb9506b2
-
SSDEEP
12288:KGKhkZ5gQ6rESOfMKTpTuwY1Et8sZHnFgEOeCRhUG5Kx:K/K/gQEaM8pTuwY1EGSlgEOeCAGi
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-