General
-
Target
404e6aba818bcec2cfebe11f2fa9d557
-
Size
804KB
-
Sample
240104-jp24aaeaf5
-
MD5
404e6aba818bcec2cfebe11f2fa9d557
-
SHA1
17e86a5790521fe516e8f4a5299eb3d931eea327
-
SHA256
71cb90765301ebbaa989b1ee8c1433def78ffda344f19be64a3a57afe296d293
-
SHA512
d72c474c838be696e11b27ea478676faa98cb08c8bd3aa2235f3bd23c7d814991c5aa06b0c215036c9852fb24ec21dc7b07c9423ceead51d4510a8fdf33fa73f
-
SSDEEP
12288:++IWjT4AnZloR65AXwgFvuSSBIL4hmrK48ft4t88q7z+q+ApldAX5yFVu/BEVl0R:++5oR6qgYaft4ef+T10U5EP0bV
Static task
static1
Behavioral task
behavioral1
Sample
404e6aba818bcec2cfebe11f2fa9d557.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
404e6aba818bcec2cfebe11f2fa9d557.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1883321234:AAG_9SFLBWQtrLAcZi4KtuAJ1wTnnOyL5Fg/sendDocument
Targets
-
-
Target
404e6aba818bcec2cfebe11f2fa9d557
-
Size
804KB
-
MD5
404e6aba818bcec2cfebe11f2fa9d557
-
SHA1
17e86a5790521fe516e8f4a5299eb3d931eea327
-
SHA256
71cb90765301ebbaa989b1ee8c1433def78ffda344f19be64a3a57afe296d293
-
SHA512
d72c474c838be696e11b27ea478676faa98cb08c8bd3aa2235f3bd23c7d814991c5aa06b0c215036c9852fb24ec21dc7b07c9423ceead51d4510a8fdf33fa73f
-
SSDEEP
12288:++IWjT4AnZloR65AXwgFvuSSBIL4hmrK48ft4t88q7z+q+ApldAX5yFVu/BEVl0R:++5oR6qgYaft4ef+T10U5EP0bV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-