General
-
Target
12ee3c38cbdcfd4bdaf92562a3abf45a68a609e5699e79b9873079691487ded0
-
Size
643KB
-
Sample
240417-r6wxlaec3z
-
MD5
fc240244ceb3ff73519ffc0fbaf3714c
-
SHA1
9d03865e12ab60dbbe89d094efda37b70df71fc7
-
SHA256
12ee3c38cbdcfd4bdaf92562a3abf45a68a609e5699e79b9873079691487ded0
-
SHA512
2ba0cc44d0c2177c25df038a5a0532048646d25515a26c577b8629c5a9912a11b45f099d12d26eda38aafcd911a25023b75eb4c6694dd8efa51d8564b27077c9
-
SSDEEP
12288:qqjhbsQB6e8XUJB31ImhH5oB4arq2l/xLXe0w25fqeSHzry9yUQlnnmPtZ:F2MCMtYzXekETGfQlnmPtZ
Static task
static1
Behavioral task
behavioral1
Sample
68a08a444393bd9381e5364456f130ae72af84618621faf74fc019f605a210fd.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
68a08a444393bd9381e5364456f130ae72af84618621faf74fc019f605a210fd.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1196962573875150888/uiR26GxnjfNsvDbrPs34TCrjUNi1WqhmHRN7yRWGpoyzDBCEuGc6ReSbQiffUiBHk3pf
Targets
-
-
Target
68a08a444393bd9381e5364456f130ae72af84618621faf74fc019f605a210fd.exe
-
Size
676KB
-
MD5
74dfcae8bbdfa11d4dbb24214ce125b7
-
SHA1
d126d4a52a7bb4234717dc07731ec9656f414a96
-
SHA256
68a08a444393bd9381e5364456f130ae72af84618621faf74fc019f605a210fd
-
SHA512
8dd1ba7e59fbebf9398b8348261c3d58a3bf9900988a4e63ab41bcd8b72b637bda3bfee62dd7da33ed2f0a0a0f90e3a17571922c69033de50d18806396bd867a
-
SSDEEP
12288:LePFLVoq3FimOaihpmVBVRmMOLmiySCeT5butfROCTc8:LePRVoMFpiO/MryjeF8fRw8
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-