General
-
Target
3567316c72553b08c61ff5060c9ed07a
-
Size
323KB
-
Sample
231225-xdsblagab3
-
MD5
3567316c72553b08c61ff5060c9ed07a
-
SHA1
0988636f84bf35d195cc442d07ec4fee3392bab9
-
SHA256
8e690143792c7b4ce093e18e1ca3132bdae357ce73f1b88d780cfbb01c2248ed
-
SHA512
61df1f1369ef5c33721d1fa12fd859d4add0599e79c83c4ee2a582358f27ed06561302d82e56d435962dcb43b0cce556d471b621657a9a9e3553307ed7c91488
-
SSDEEP
6144:Ed53TvpHeIl07UnoiGeKGDuGyGNMHf5O8e5ObFcrsOLjOjXAYyU4tXIQn+8/7Dhv:Ed53TvpHeIl07Un2s8UXZt77/hHIIdJ7
Static task
static1
Behavioral task
behavioral1
Sample
3567316c72553b08c61ff5060c9ed07a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3567316c72553b08c61ff5060c9ed07a.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1850887036:AAH6KBVsKQqY803XMNw1ISD7pOs58OpZSho/sendDocument
Targets
-
-
Target
3567316c72553b08c61ff5060c9ed07a
-
Size
323KB
-
MD5
3567316c72553b08c61ff5060c9ed07a
-
SHA1
0988636f84bf35d195cc442d07ec4fee3392bab9
-
SHA256
8e690143792c7b4ce093e18e1ca3132bdae357ce73f1b88d780cfbb01c2248ed
-
SHA512
61df1f1369ef5c33721d1fa12fd859d4add0599e79c83c4ee2a582358f27ed06561302d82e56d435962dcb43b0cce556d471b621657a9a9e3553307ed7c91488
-
SSDEEP
6144:Ed53TvpHeIl07UnoiGeKGDuGyGNMHf5O8e5ObFcrsOLjOjXAYyU4tXIQn+8/7Dhv:Ed53TvpHeIl07Un2s8UXZt77/hHIIdJ7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-