General
-
Target
7a24eccdf4b1f9449e4cdd5d44ffa33f3938d2e60951c966b3ef615400c62630
-
Size
688KB
-
Sample
240417-r58vrscg52
-
MD5
b11863d8c19efdbea114e07f2c551779
-
SHA1
b3a3a658507f0bf58a06f7982582154c78e6b0e6
-
SHA256
7a24eccdf4b1f9449e4cdd5d44ffa33f3938d2e60951c966b3ef615400c62630
-
SHA512
fb88a17d1ee58c26864834e4ac9d01001f595c6e46ab5b9455fcdd22dbc9e1fde8921b4b005ba899b6f8db0cc60403e31bf45786b493f5d0921e70b303e8496f
-
SSDEEP
12288:l/aT1ujoNeqd90t6YDNUx+fDNT06otvuoRP0rjjFu/turaj5yHG:l/aT1ujO0t5NU+f5EMjxUtefG
Static task
static1
Behavioral task
behavioral1
Sample
bd78ecae205703d7efa045dfd85bd9e73854fc19ed71ce8acb8d1342ef083bcf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd78ecae205703d7efa045dfd85bd9e73854fc19ed71ce8acb8d1342ef083bcf.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1196962573875150888/uiR26GxnjfNsvDbrPs34TCrjUNi1WqhmHRN7yRWGpoyzDBCEuGc6ReSbQiffUiBHk3pf
Targets
-
-
Target
bd78ecae205703d7efa045dfd85bd9e73854fc19ed71ce8acb8d1342ef083bcf.exe
-
Size
748KB
-
MD5
5b9ceef22111f9ec198bf344d83234a7
-
SHA1
23cb7d9f8e07555e0be0ac70d319239889935efa
-
SHA256
bd78ecae205703d7efa045dfd85bd9e73854fc19ed71ce8acb8d1342ef083bcf
-
SHA512
45468b256f6220df19e1a269b85e9a0eeafcfb92197e8eed8d6773e279a9e412080648944428ee75147cbaa4060c71e6d43198058ce77081034758cbe8ae9c0f
-
SSDEEP
12288:vWqgEzCB2s2iNhJz/IIHF3fKqHhGnr4ni/nfInjShUzjwXYGGfLnSu9wRJcpgRA5:u9B2s1HJz/IIHFv9HhGHIjxjTLnSX4lX
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-