General
-
Target
e4598c7dc0adfa33b9140a385eab0350046c5b3433c0da676a5510803b9285c4.zip
-
Size
1.5MB
-
Sample
240430-cfs1pahc26
-
MD5
b1df3cc35dc8793983b682f64d5529a4
-
SHA1
3ebcf66c1fc288b32108b09f3edc2ef8bc4307db
-
SHA256
e4598c7dc0adfa33b9140a385eab0350046c5b3433c0da676a5510803b9285c4
-
SHA512
7713e0f9e5e61299db3a1b33c68bc744b292f859e0800251a6d82bab910dfb14ce35d9a74d67e52bebfd5de0e19348eaabc91a37efc9c86563141d7b459e0842
-
SSDEEP
12288:7H7PW6OKVad7DLUrDfbUxMK1J8BgzaBq/WTy05X4AcdGNoP9:T7auaNDuDTUxZFeBZN5X42Nm9
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Payment Confirmation.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6418207961:AAH1E3CkRrfH5aPds3LBLBZiKWkWD7qbX90/
Targets
-
-
Target
Payment Confirmation.exe
-
Size
810.6MB
-
MD5
812fe5ef59f8cbb7d7f3736240ff73c1
-
SHA1
06f4822b98f5353615b4742191eab338af06ba8a
-
SHA256
64eaa0a244acc5f54a880250edc683cf0527f8321e43167068ff4eb463612bbf
-
SHA512
650c7870377173cc49bc71659d645d992beedbde203ccb11db2d2b0d0be8c4f62441122818b0264ca652d3655ae8f6ba8e7e05d9841985abe3943d291c29dc48
-
SSDEEP
12288:PNgLeFR6rXlv312Z3Zpxax7Z9UrvcPcZpNvy+TJ+BMzaBqFWHi05XNYUO:yXJ312ZZHapZ4GcZpNvl/eB5J5X2J
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Suspicious use of SetThreadContext
-