General
-
Target
e2b7d5af1af91ac9b5ea680cbb2688d999356f0eb4f8e52c73a5faae33f80b3f
-
Size
894KB
-
Sample
240312-bv1hmsca3z
-
MD5
a6b733c2c194d6d0bfe47faa6d680733
-
SHA1
681d0adc913fcbc30cdee00f819c1f25fe0d1360
-
SHA256
e2b7d5af1af91ac9b5ea680cbb2688d999356f0eb4f8e52c73a5faae33f80b3f
-
SHA512
d972516537f82dc7b484ffcdd93a5d454fc10a26c2af23d9da45db2d6a6ecda1c305777dd7ac8358b7cea07f3ae47e3ba7d62a398ee6076c8a61a5829ae15ffe
-
SSDEEP
12288:HF/Sr+pAQ3inVFaqngJG28iRqOgQ8eVD9qF6nAQ5FnqiMSg4JduBbkR:U+AQ32HvD28MqNcB9tZnHNDJx
Static task
static1
Behavioral task
behavioral1
Sample
e2b7d5af1af91ac9b5ea680cbb2688d999356f0eb4f8e52c73a5faae33f80b3f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2b7d5af1af91ac9b5ea680cbb2688d999356f0eb4f8e52c73a5faae33f80b3f.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6620339710:AAFLquH02IVJR3RhR_4eZWR4lTYJ2k1TxJo/
Targets
-
-
Target
e2b7d5af1af91ac9b5ea680cbb2688d999356f0eb4f8e52c73a5faae33f80b3f
-
Size
894KB
-
MD5
a6b733c2c194d6d0bfe47faa6d680733
-
SHA1
681d0adc913fcbc30cdee00f819c1f25fe0d1360
-
SHA256
e2b7d5af1af91ac9b5ea680cbb2688d999356f0eb4f8e52c73a5faae33f80b3f
-
SHA512
d972516537f82dc7b484ffcdd93a5d454fc10a26c2af23d9da45db2d6a6ecda1c305777dd7ac8358b7cea07f3ae47e3ba7d62a398ee6076c8a61a5829ae15ffe
-
SSDEEP
12288:HF/Sr+pAQ3inVFaqngJG28iRqOgQ8eVD9qF6nAQ5FnqiMSg4JduBbkR:U+AQ32HvD28MqNcB9tZnHNDJx
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-