General
-
Target
d8918d2825e1323acce87ad54039bda1.bin
-
Size
766KB
-
Sample
240428-cb6qzsdf38
-
MD5
f7b990b108d583f0a43e0ce0672eb85b
-
SHA1
6b2d4e64694fa65a15f5323c6e1595d8e06e15d4
-
SHA256
1e6cb58b85849b6626fc6915f38e733d66d1c59928fe1d3f79edc8968a0a5164
-
SHA512
f24e3f01a332fabce187dd96c40df9e0dfcc345bbb284eb77da50735cceccda15ffa87fded945beb050f47d8a60e86b5c71a1dc3c33db3de9543465bab9673b6
-
SSDEEP
12288:1bCdoT+QLjgUM7DclJxFkSxRlwrpIqRyjDuEDjYksHx/BpzNVs9jMcD9d7S1C:uoTJju7DclJxFVjE0DfDjYksHx/BRNVi
Static task
static1
Behavioral task
behavioral1
Sample
dekont_20240424_388993774837743.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dekont_20240424_388993774837743.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6542794227:AAFN3zw1IO9ShlzjqfCM2wKZwSz3yRGzRas/
Targets
-
-
Target
dekont_20240424_388993774837743.exe
-
Size
1000KB
-
MD5
899f3fc8c4f3584ee69c1f302eb7ed3c
-
SHA1
b8cb8b8010a32f5698dd5f40bdc3069a02473bf0
-
SHA256
237e35d7e5f71e53faa66955d912ab7c132efeb7c0259d2ad21af6d6f538d553
-
SHA512
ac66739646767c4ee95de811c8c025138ea4d87278c4e7e38e99b4a377ea97d3dc7f0a90d61ccc4379cf52bed414766685427efd6b25e94ad4fb5be94a0cc122
-
SSDEEP
24576:UsP3nYjPuJ3FYB9myrPygZxjKER/pamxFx5:UwJ31aagZxGa/pamd5
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-