General
-
Target
loggggg.exe
-
Size
351KB
-
Sample
240311-swfcjaac54
-
MD5
278015a19d8c36ae65b7b4a75844268e
-
SHA1
14785c7c6a476a915fc56ae2aeb980854cec5308
-
SHA256
6ec934b7870cac065a7f9e3e92631e97293c4b5754a36902f133c45101cc5514
-
SHA512
3eb19807af1ae1f74eb27d92f225b5efa37dd6919502313af95870c8c0b8b966b488027e1c73617ed87748d9a82b05cf1c5a00f3d7257f3cc98e177e226bb42a
-
SSDEEP
6144:TArRy+iwN+1prBnJ+dz2ifHhRoKiGgtwWXs9qI5MR9x9YimoG7Ohf:TArRyUqBQ12ChRo2WR9dG7k
Static task
static1
Behavioral task
behavioral1
Sample
loggggg.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
loggggg.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6701575727:AAH5fUj-JYRvr8ZYms1aw4-XvuerP8njXdI/
Targets
-
-
Target
loggggg.exe
-
Size
351KB
-
MD5
278015a19d8c36ae65b7b4a75844268e
-
SHA1
14785c7c6a476a915fc56ae2aeb980854cec5308
-
SHA256
6ec934b7870cac065a7f9e3e92631e97293c4b5754a36902f133c45101cc5514
-
SHA512
3eb19807af1ae1f74eb27d92f225b5efa37dd6919502313af95870c8c0b8b966b488027e1c73617ed87748d9a82b05cf1c5a00f3d7257f3cc98e177e226bb42a
-
SSDEEP
6144:TArRy+iwN+1prBnJ+dz2ifHhRoKiGgtwWXs9qI5MR9x9YimoG7Ohf:TArRyUqBQ12ChRo2WR9dG7k
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-