General
-
Target
c63396fe648525dfef4beb44e2bb8e7bd117c82cf9a11a102933cdeb734296f3
-
Size
379KB
-
Sample
240307-ch7xmaeb4y
-
MD5
00efdcdb3b9970572aa6072799b27484
-
SHA1
b8dc8c95255da9f28fe80e4e4cf32e97fb364f65
-
SHA256
c63396fe648525dfef4beb44e2bb8e7bd117c82cf9a11a102933cdeb734296f3
-
SHA512
bf29bd32b47fb898bc6bfa9e431a40e39d79a2d81c8a286e25293ea3ee98fa295b4f1a4ae77e88a8b8e63d82018f4f305f0551f16f39629f996d7861e37d35bb
-
SSDEEP
768:uCYYVM+NGCKG+oSfmfIBnyAWkaHRQMwdz+4H4447iiL1F:pYpYXmyAWNHRjmz+4H444lF
Static task
static1
Behavioral task
behavioral1
Sample
c63396fe648525dfef4beb44e2bb8e7bd117c82cf9a11a102933cdeb734296f3.exe
Resource
win7-20240220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6359093814:AAF_EjsxYKPM2ufeJYS89EiAg_4CPa-HNlM/
Targets
-
-
Target
c63396fe648525dfef4beb44e2bb8e7bd117c82cf9a11a102933cdeb734296f3
-
Size
379KB
-
MD5
00efdcdb3b9970572aa6072799b27484
-
SHA1
b8dc8c95255da9f28fe80e4e4cf32e97fb364f65
-
SHA256
c63396fe648525dfef4beb44e2bb8e7bd117c82cf9a11a102933cdeb734296f3
-
SHA512
bf29bd32b47fb898bc6bfa9e431a40e39d79a2d81c8a286e25293ea3ee98fa295b4f1a4ae77e88a8b8e63d82018f4f305f0551f16f39629f996d7861e37d35bb
-
SSDEEP
768:uCYYVM+NGCKG+oSfmfIBnyAWkaHRQMwdz+4H4447iiL1F:pYpYXmyAWNHRjmz+4H444lF
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-