General
-
Target
899f3fc8c4f3584ee69c1f302eb7ed3c.bin
-
Size
780KB
-
Sample
240428-by5lrsde6y
-
MD5
403efc16d72368845c2f4460346e37d1
-
SHA1
9be16b804d6e4e77e370c5cd03ba7014c980ebd0
-
SHA256
584f542a0ba8ccc8c0866d6cab2f8e58919be685ca7d18ab9d4c64ab7aa64a52
-
SHA512
34acdd3e619f5f26ef6b48ebf741abdb7d20cb3ca62d55f6822279c9bcbe621025f16d431b4ef8b5a75f78ee0c77c4570fa8f3313668c850067ee332b168a836
-
SSDEEP
12288:uPjp7vJEPVHPXbfXEPRn5x8E5UeWlba04SxnQGr0v8/qY3VpJlzgZ0HJ7kAII0jm:a7v+dHPrfUPHx8E5R04In4NUpIKVO4j
Static task
static1
Behavioral task
behavioral1
Sample
237e35d7e5f71e53faa66955d912ab7c132efeb7c0259d2ad21af6d6f538d553.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
237e35d7e5f71e53faa66955d912ab7c132efeb7c0259d2ad21af6d6f538d553.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6542794227:AAFN3zw1IO9ShlzjqfCM2wKZwSz3yRGzRas/
Targets
-
-
Target
237e35d7e5f71e53faa66955d912ab7c132efeb7c0259d2ad21af6d6f538d553.exe
-
Size
1000KB
-
MD5
899f3fc8c4f3584ee69c1f302eb7ed3c
-
SHA1
b8cb8b8010a32f5698dd5f40bdc3069a02473bf0
-
SHA256
237e35d7e5f71e53faa66955d912ab7c132efeb7c0259d2ad21af6d6f538d553
-
SHA512
ac66739646767c4ee95de811c8c025138ea4d87278c4e7e38e99b4a377ea97d3dc7f0a90d61ccc4379cf52bed414766685427efd6b25e94ad4fb5be94a0cc122
-
SSDEEP
24576:UsP3nYjPuJ3FYB9myrPygZxjKER/pamxFx5:UwJ31aagZxGa/pamd5
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-