General
-
Target
12533b424fc0e2699ee631f70f90c53a
-
Size
371KB
-
Sample
231230-jfxgfaccdj
-
MD5
12533b424fc0e2699ee631f70f90c53a
-
SHA1
af8bdea7faee3089d42ce253a9459795ee8cf6b1
-
SHA256
4a1040f8742a36f31cf465ff3a17e462fae631f2f87dcf40bdbb1f59d439b0fa
-
SHA512
87bd58328d8d39c02ce421bbf07842bc9c04199c5958e5aadab444436cc78790fb043370157e0c841a2fff99c2b015b59ee367c8a141f1aaf2b4e3a8e809d404
-
SSDEEP
6144:So6wE99mkHuNYXYeDAxstB2WKvD62uiOYIfBbXSm7ezQHRUqiX+NW0e9S+:UCkONYodutB2hDUiqBbXBBxbiONWbS+
Static task
static1
Behavioral task
behavioral1
Sample
brosz.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
brosz.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1441818786:AAEjowjV33jxZfRAQA1ZhCfa4hQu3m4RGtc/sendDocument
Targets
-
-
Target
brosz.exe
-
Size
397KB
-
MD5
0d551f659a58ebf82061d90352261973
-
SHA1
df57f5e2a64fb64053295f0667522e24301d9b90
-
SHA256
b339f9f5d019aa3d928055bbc35d827af151b0dfd31ca23d8cc6d3344fa0300d
-
SHA512
5624b0fde3ed7708c575f0620d749907d6a0f3fadf34e2df720c225bf56ecae8ed9be1a8106cf7ab38d673af1d52ce3cea9be44cbb741a6520d861e83a93e66d
-
SSDEEP
12288:brf0P3HD5YV3Y/u+TN0iSqYBCnNKCGaIGV:0P3H1YVQx57iEKuIO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-