General
-
Target
Payment Confirmation.tgz
-
Size
1.5MB
-
Sample
240416-h6ajxscb65
-
MD5
bd7332626030a509435cc9f1228a9bdd
-
SHA1
891252448886ee7feb9d03bd5ddf5d07716bf9fc
-
SHA256
cfe615cdbd854f6349c06fa2940a03bc0b03cb89261aa03fdb744ae2718a1579
-
SHA512
71179d4a5f510c8386789c45b6662901b0a741fbefcf75595fb5b22590df97d9764051a5c89e15ccb762b8ddfc7a2b795c0b28862ce7bd20bfb8ff5826cfdffb
-
SSDEEP
24576:E3Bk7dkilwiEW9+1Jk2MRrEOYe4dwJcADwokBHX:E3Bk7dMiE8+k2sCU1wokB3
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Payment Confirmation.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6834342758:AAHnpbyPCzi-sEo22oVL6DdX9cuTElu_WyA/
Targets
-
-
Target
Payment Confirmation.exe
-
Size
810.6MB
-
MD5
aa378e18ce2c31bdda7b895fa2c1f5eb
-
SHA1
32b283eeaf191234998cce48093b38733c4c3a49
-
SHA256
c4174fb892b92cae024f1dcbd35d779c056e5533c4b883e1388f0616a07d9439
-
SHA512
cdc6d5c29955d9517fc1c81c166c6f5f01d189f0f69643a36dd9b985974ade2dfeaa000f04c17167472b6aeccdc386fadac678ab0003d77d89022c8d6ae9da2d
-
SSDEEP
24576:kAs1kFlsitMisWb811kyajrKOYo4HkJ+yxwWZw:9qkFl8isA80yC0mFwW
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-