General
-
Target
21c2a89d7532be43315dd9fcd99c2df41a756deab3197df2adcc6e82f46c074f
-
Size
51KB
-
Sample
231213-b31tdaffh7
-
MD5
7620ca719f502b7ca1d57d3c8a6992c7
-
SHA1
0548b3aa9ac9fc1781797e6717fa2b8d64309b0e
-
SHA256
21c2a89d7532be43315dd9fcd99c2df41a756deab3197df2adcc6e82f46c074f
-
SHA512
e855fa6c133191d0fc9e12fe146160e4d600fb9adb5ae498b70077695a46432856fe5ded034058957c711c507ace1ae07245075b86b006692073e42824e867f5
-
SSDEEP
768:88vmj2dB9pR016DBvV1I/Ptw9wyjeBw2MuDGEPAMxkE9s:88zB9pC16V91I9ryjeuj2xps
Static task
static1
Behavioral task
behavioral1
Sample
21c2a89d7532be43315dd9fcd99c2df41a756deab3197df2adcc6e82f46c074f.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
21c2a89d7532be43315dd9fcd99c2df41a756deab3197df2adcc6e82f46c074f.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6548288330:AAGA-b1ojgiCCinc5YQor8R1kxgez4hPFpM/
Targets
-
-
Target
21c2a89d7532be43315dd9fcd99c2df41a756deab3197df2adcc6e82f46c074f
-
Size
51KB
-
MD5
7620ca719f502b7ca1d57d3c8a6992c7
-
SHA1
0548b3aa9ac9fc1781797e6717fa2b8d64309b0e
-
SHA256
21c2a89d7532be43315dd9fcd99c2df41a756deab3197df2adcc6e82f46c074f
-
SHA512
e855fa6c133191d0fc9e12fe146160e4d600fb9adb5ae498b70077695a46432856fe5ded034058957c711c507ace1ae07245075b86b006692073e42824e867f5
-
SSDEEP
768:88vmj2dB9pR016DBvV1I/Ptw9wyjeBw2MuDGEPAMxkE9s:88zB9pC16V91I9ryjeuj2xps
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-