General
-
Target
1337e62b20546673f5a0e4aadf13d921
-
Size
474KB
-
Sample
231224-1fbneafefj
-
MD5
1337e62b20546673f5a0e4aadf13d921
-
SHA1
807bf1807ff195da452728626ccf017d498cf648
-
SHA256
302d65085a5f4a8c533095d18dc1cd428445809644ca924e8dfa2af33d1448c6
-
SHA512
b63217e24befed25970a1bee42cdce046fe17a571aa78e4bf4f66b88c5d088118a609dc667bdf0ec9e6f58d6c3632bdc5fe66318af20d5bb0f69712780a01c7b
-
SSDEEP
12288:WfX25krtcNSYIg8qGkllWvxgRs0QYe8LQoaVWD65WTv/HrG8O1mK:WfX25krtcNSYIgfu70MajaVWD6Ov/Hrm
Static task
static1
Behavioral task
behavioral1
Sample
1337e62b20546673f5a0e4aadf13d921.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1337e62b20546673f5a0e4aadf13d921.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1898788581:AAEbsCzTih-rxVDH11H9U8nZ_h_9VfJgvh4/sendDocument
Targets
-
-
Target
1337e62b20546673f5a0e4aadf13d921
-
Size
474KB
-
MD5
1337e62b20546673f5a0e4aadf13d921
-
SHA1
807bf1807ff195da452728626ccf017d498cf648
-
SHA256
302d65085a5f4a8c533095d18dc1cd428445809644ca924e8dfa2af33d1448c6
-
SHA512
b63217e24befed25970a1bee42cdce046fe17a571aa78e4bf4f66b88c5d088118a609dc667bdf0ec9e6f58d6c3632bdc5fe66318af20d5bb0f69712780a01c7b
-
SSDEEP
12288:WfX25krtcNSYIg8qGkllWvxgRs0QYe8LQoaVWD65WTv/HrG8O1mK:WfX25krtcNSYIgfu70MajaVWD6Ov/Hrm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-