General
-
Target
e3feb12dcf485ad048597906bec1860a6e06bc117fd83786d07423d142bce8e3
-
Size
992KB
-
Sample
240425-bs9njacg96
-
MD5
3b20ec9ea1d0d5723894f6f294a3a4e7
-
SHA1
dad2c7919b92bf89fa5031019db4e6b99c1ca1f5
-
SHA256
e3feb12dcf485ad048597906bec1860a6e06bc117fd83786d07423d142bce8e3
-
SHA512
ce450040021723afaf4c0a0356611123d3673ec6ea09e53b0e09b1c6a9b83f4e3f2ead404da701bb638031379657230028f552368eeca7145a83e1fd2f9d3cc2
-
SSDEEP
24576:80QxxaC8OeT29IhZ2Yj9IkcX8Y8Hqm3YcDCLaMjK3K7:8wC8HT2902YRIkm8YmYmfpK7
Static task
static1
Behavioral task
behavioral1
Sample
e3feb12dcf485ad048597906bec1860a6e06bc117fd83786d07423d142bce8e3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e3feb12dcf485ad048597906bec1860a6e06bc117fd83786d07423d142bce8e3.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6829945031:AAEyys9fnk7e8MAzVp2oaMaeJ17CeV3jW00/
Targets
-
-
Target
e3feb12dcf485ad048597906bec1860a6e06bc117fd83786d07423d142bce8e3
-
Size
992KB
-
MD5
3b20ec9ea1d0d5723894f6f294a3a4e7
-
SHA1
dad2c7919b92bf89fa5031019db4e6b99c1ca1f5
-
SHA256
e3feb12dcf485ad048597906bec1860a6e06bc117fd83786d07423d142bce8e3
-
SHA512
ce450040021723afaf4c0a0356611123d3673ec6ea09e53b0e09b1c6a9b83f4e3f2ead404da701bb638031379657230028f552368eeca7145a83e1fd2f9d3cc2
-
SSDEEP
24576:80QxxaC8OeT29IhZ2Yj9IkcX8Y8Hqm3YcDCLaMjK3K7:8wC8HT2902YRIkm8YmYmfpK7
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-