General
-
Target
5f4169a8824fda323a8447cbdd8622d682e1364528946062905724fd364d3fdc.r00
-
Size
765KB
-
Sample
240427-bsq67aga76
-
MD5
d8918d2825e1323acce87ad54039bda1
-
SHA1
5fc0c830d5b86b207397ab72b2f2a8aff8c114b7
-
SHA256
5f4169a8824fda323a8447cbdd8622d682e1364528946062905724fd364d3fdc
-
SHA512
4c287bf901a5a6069dfaa8cf3afec0e801e0c0b2b7d82fba63596df05e1bfd46f5fe7db392bea3d24b62a9d9680140596a46cf010f4e8868349ad652b30a2b5f
-
SSDEEP
12288:Ue+FYqMHx5hDHAbFFdQt005XIEq9XPkBCs2Wo6+bDN87UOYULeUL0G0uyw8IFGKK:gFYqMHx5pHALdQtp5XIEIXajho6+bD2s
Static task
static1
Behavioral task
behavioral1
Sample
dekont_20240424_388993774837743.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dekont_20240424_388993774837743.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6542794227:AAFN3zw1IO9ShlzjqfCM2wKZwSz3yRGzRas/
Targets
-
-
Target
dekont_20240424_388993774837743.exe
-
Size
1000KB
-
MD5
899f3fc8c4f3584ee69c1f302eb7ed3c
-
SHA1
b8cb8b8010a32f5698dd5f40bdc3069a02473bf0
-
SHA256
237e35d7e5f71e53faa66955d912ab7c132efeb7c0259d2ad21af6d6f538d553
-
SHA512
ac66739646767c4ee95de811c8c025138ea4d87278c4e7e38e99b4a377ea97d3dc7f0a90d61ccc4379cf52bed414766685427efd6b25e94ad4fb5be94a0cc122
-
SSDEEP
24576:UsP3nYjPuJ3FYB9myrPygZxjKER/pamxFx5:UwJ31aagZxGa/pamd5
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables packed with or use KoiVM
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Suspicious use of SetThreadContext
-