General
-
Target
382aca605df6a6c8234a2e11278842a7.exe
-
Size
709KB
-
Sample
240110-x6v8ysfec2
-
MD5
382aca605df6a6c8234a2e11278842a7
-
SHA1
c2c94afc5607aec9ace0379228310bdd3ce0c4fd
-
SHA256
7342ecd8ee970e7d39fd3bcc3959a6e8477b3136f87f391f3e08a36354d056cb
-
SHA512
8d3d3e8c2df571b6bcdf658fb26ac86f8b40310cb73e1400762aa45f1ea207fdd5ed822122c1523d92d28b0476ec77c26edb16e23ac3087f30f9dd82f0c92319
-
SSDEEP
6144:T1W1nA/DpvTpUMDqoskW9hzudasjfAO2L9L9LQ45cJiVAS8zVzF2o8PuurCp/6lw:T1Wl8TpUMxskWv6jfq9MPiqRdbcSC6
Static task
static1
Behavioral task
behavioral1
Sample
382aca605df6a6c8234a2e11278842a7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
382aca605df6a6c8234a2e11278842a7.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1832540343:AAHsy158u8bpuWPQotjLTEV4VBrAuHkq-SU/sendDocument
Targets
-
-
Target
382aca605df6a6c8234a2e11278842a7.exe
-
Size
709KB
-
MD5
382aca605df6a6c8234a2e11278842a7
-
SHA1
c2c94afc5607aec9ace0379228310bdd3ce0c4fd
-
SHA256
7342ecd8ee970e7d39fd3bcc3959a6e8477b3136f87f391f3e08a36354d056cb
-
SHA512
8d3d3e8c2df571b6bcdf658fb26ac86f8b40310cb73e1400762aa45f1ea207fdd5ed822122c1523d92d28b0476ec77c26edb16e23ac3087f30f9dd82f0c92319
-
SSDEEP
6144:T1W1nA/DpvTpUMDqoskW9hzudasjfAO2L9L9LQ45cJiVAS8zVzF2o8PuurCp/6lw:T1Wl8TpUMxskWv6jfq9MPiqRdbcSC6
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-