General
-
Target
a0b4cda7081cf7b70c18d1419a233262afb24a534ea1fbe64562ef4cb1833d8c
-
Size
777KB
-
Sample
240522-ctgjtahd9s
-
MD5
02948735cd4656bbb671a55e1eec673d
-
SHA1
451bf6e14ddb6690c45ad5b063576813fe6e23c2
-
SHA256
a0b4cda7081cf7b70c18d1419a233262afb24a534ea1fbe64562ef4cb1833d8c
-
SHA512
7176eacf4397443ca07ccd391fef639ba3fd55f39085729127cab684477590777d21ed20b4e633534cf86cd6f9d655441ba81b367a0d1aa40a5ab8456eb4a280
-
SSDEEP
24576:aF1i40dw5z8B7ZSEeS2jZai+H9WJ312ZF:0Dap8EH2jCH9WJl2n
Static task
static1
Behavioral task
behavioral1
Sample
a0b4cda7081cf7b70c18d1419a233262afb24a534ea1fbe64562ef4cb1833d8c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0b4cda7081cf7b70c18d1419a233262afb24a534ea1fbe64562ef4cb1833d8c.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6418207961:AAH1E3CkRrfH5aPds3LBLBZiKWkWD7qbX90/
Targets
-
-
Target
a0b4cda7081cf7b70c18d1419a233262afb24a534ea1fbe64562ef4cb1833d8c
-
Size
777KB
-
MD5
02948735cd4656bbb671a55e1eec673d
-
SHA1
451bf6e14ddb6690c45ad5b063576813fe6e23c2
-
SHA256
a0b4cda7081cf7b70c18d1419a233262afb24a534ea1fbe64562ef4cb1833d8c
-
SHA512
7176eacf4397443ca07ccd391fef639ba3fd55f39085729127cab684477590777d21ed20b4e633534cf86cd6f9d655441ba81b367a0d1aa40a5ab8456eb4a280
-
SSDEEP
24576:aF1i40dw5z8B7ZSEeS2jZai+H9WJ312ZF:0Dap8EH2jCH9WJl2n
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-