General
-
Target
b9ff7f7e1ba80c6b3e1a1140d4ae19ea01a02a079375eb65c68cdc7e7244d380
-
Size
166KB
-
Sample
240524-bf9srsfg73
-
MD5
8ee016d78278fcc87a30ddb19ccfd18d
-
SHA1
dac4fe61293c5ff43262d919b106dcfdce8a2d05
-
SHA256
b9ff7f7e1ba80c6b3e1a1140d4ae19ea01a02a079375eb65c68cdc7e7244d380
-
SHA512
2f5cbcb1c46a59a2f26a61de89ac32a7dca0bef9c51bf5d3525ae8b68617e82b4fbd295731b593cc728e2fbb80023e1007f341d20c2ed482860c1a87bceb4b0e
-
SSDEEP
3072:57GRDB+1FLix9kS+BI3GNqDl8jvhbmZ0JZiYzRKVVVzgo51cmbW:4RaLK9GBI3GNMGLUvYzCzdM
Behavioral task
behavioral1
Sample
b9ff7f7e1ba80c6b3e1a1140d4ae19ea01a02a079375eb65c68cdc7e7244d380.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9ff7f7e1ba80c6b3e1a1140d4ae19ea01a02a079375eb65c68cdc7e7244d380.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
https://discordapp.com/api/webhooks/1109048382372200528/V3xz9tyZZFNeRC2vvLAQWtG3K8MzCZJRiPEyYd_4WnUYo8YuI7IjVRmEopETtCFgfCXh
Targets
-
-
Target
b9ff7f7e1ba80c6b3e1a1140d4ae19ea01a02a079375eb65c68cdc7e7244d380
-
Size
166KB
-
MD5
8ee016d78278fcc87a30ddb19ccfd18d
-
SHA1
dac4fe61293c5ff43262d919b106dcfdce8a2d05
-
SHA256
b9ff7f7e1ba80c6b3e1a1140d4ae19ea01a02a079375eb65c68cdc7e7244d380
-
SHA512
2f5cbcb1c46a59a2f26a61de89ac32a7dca0bef9c51bf5d3525ae8b68617e82b4fbd295731b593cc728e2fbb80023e1007f341d20c2ed482860c1a87bceb4b0e
-
SSDEEP
3072:57GRDB+1FLix9kS+BI3GNqDl8jvhbmZ0JZiYzRKVVVzgo51cmbW:4RaLK9GBI3GNMGLUvYzCzdM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-