General
-
Target
42f1dfeb9073d32b3fe576e2f6cd470a31b9d229a6b3b942c47c0164ef49a1ee
-
Size
610KB
-
Sample
240329-canh1see4t
-
MD5
b77fc7d018a5dd1ea5607c061a734d0d
-
SHA1
121552c16ab6ccf844a67df9b7e19fda7ecb55a3
-
SHA256
42f1dfeb9073d32b3fe576e2f6cd470a31b9d229a6b3b942c47c0164ef49a1ee
-
SHA512
2e54055cf3cb68370eb356c23ee689aa46c55147da7eb89ea97f55fb6b367468b18923fbc1422b9d3460f0e5186a55098210f65873ba83e722d9ed7f18368bd6
-
SSDEEP
12288:sbPngQuFdk6Wjn1ozqZN9N6jHszKpIFzdgLbjE/yo3L0r+4Byna5W:sbPluTk6Gn1n336OZMjESr1Yt
Static task
static1
Behavioral task
behavioral1
Sample
42f1dfeb9073d32b3fe576e2f6cd470a31b9d229a6b3b942c47c0164ef49a1ee.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42f1dfeb9073d32b3fe576e2f6cd470a31b9d229a6b3b942c47c0164ef49a1ee.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6834342758:AAHnpbyPCzi-sEo22oVL6DdX9cuTElu_WyA/
Targets
-
-
Target
42f1dfeb9073d32b3fe576e2f6cd470a31b9d229a6b3b942c47c0164ef49a1ee
-
Size
610KB
-
MD5
b77fc7d018a5dd1ea5607c061a734d0d
-
SHA1
121552c16ab6ccf844a67df9b7e19fda7ecb55a3
-
SHA256
42f1dfeb9073d32b3fe576e2f6cd470a31b9d229a6b3b942c47c0164ef49a1ee
-
SHA512
2e54055cf3cb68370eb356c23ee689aa46c55147da7eb89ea97f55fb6b367468b18923fbc1422b9d3460f0e5186a55098210f65873ba83e722d9ed7f18368bd6
-
SSDEEP
12288:sbPngQuFdk6Wjn1ozqZN9N6jHszKpIFzdgLbjE/yo3L0r+4Byna5W:sbPluTk6Gn1n336OZMjESr1Yt
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-