General
-
Target
363a0caf3081cf2e884e78477b6d29375caa9b11209c2a0713c0640ce57e0943
-
Size
1.0MB
-
Sample
240427-b8ywzagf32
-
MD5
fbedfb3f7b3972064e89527e731dc60a
-
SHA1
6f6a87a2308d265418ca853e745c1fa3d7e2dbfb
-
SHA256
363a0caf3081cf2e884e78477b6d29375caa9b11209c2a0713c0640ce57e0943
-
SHA512
6b06c16cc73f9f008105d12036525a51e7c779bdf52656fd319c13b0518dc345c2760a2ebf221ed6a5f61c3b201a155fa03326ec3c6c27dbf8cb191d300ddf70
-
SSDEEP
24576:OATWl5H0A6qxOKVU3yV2MUdLKZIif+yGtHKqL7oEkGQ6S2:hsyv0R5VFo+ZR8lKgVQ6/
Static task
static1
Behavioral task
behavioral1
Sample
363a0caf3081cf2e884e78477b6d29375caa9b11209c2a0713c0640ce57e0943.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
363a0caf3081cf2e884e78477b6d29375caa9b11209c2a0713c0640ce57e0943.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7118535710:AAHHi1K0M2ND5qzM9aJbrZmPPPlbIjWi1Gc/
Targets
-
-
Target
363a0caf3081cf2e884e78477b6d29375caa9b11209c2a0713c0640ce57e0943
-
Size
1.0MB
-
MD5
fbedfb3f7b3972064e89527e731dc60a
-
SHA1
6f6a87a2308d265418ca853e745c1fa3d7e2dbfb
-
SHA256
363a0caf3081cf2e884e78477b6d29375caa9b11209c2a0713c0640ce57e0943
-
SHA512
6b06c16cc73f9f008105d12036525a51e7c779bdf52656fd319c13b0518dc345c2760a2ebf221ed6a5f61c3b201a155fa03326ec3c6c27dbf8cb191d300ddf70
-
SSDEEP
24576:OATWl5H0A6qxOKVU3yV2MUdLKZIif+yGtHKqL7oEkGQ6S2:hsyv0R5VFo+ZR8lKgVQ6/
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-