General
-
Target
8feff55469c7d5bc9dbfaab62fe9b78843c3fabad5be532da632352fd18b549d.exe
-
Size
579KB
-
Sample
240918-bsvjlswbmj
-
MD5
ee32c969a50da7d3a2021509f1d270f5
-
SHA1
5b50c87678e7c8b70f271c3cd135683ffd4a0498
-
SHA256
8feff55469c7d5bc9dbfaab62fe9b78843c3fabad5be532da632352fd18b549d
-
SHA512
d23311573363e0f8b9b1ba41b2c5b40b32627a75b2bedbd47f10ddf6efbf909be7ccb56086e1d585ee177f6177350fdcd4565d0adb6e8696ade9311303450817
-
SSDEEP
12288:+CuFjGTip659kZlslwXP4sp+ezCn2b4C:sFZwcTsOfppTzCC
Static task
static1
Behavioral task
behavioral1
Sample
8feff55469c7d5bc9dbfaab62fe9b78843c3fabad5be532da632352fd18b549d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8feff55469c7d5bc9dbfaab62fe9b78843c3fabad5be532da632352fd18b549d.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5932003035:AAGiWu3EDh9FYzqRKIySebzjjQ5uW0afS3o/
Targets
-
-
Target
8feff55469c7d5bc9dbfaab62fe9b78843c3fabad5be532da632352fd18b549d.exe
-
Size
579KB
-
MD5
ee32c969a50da7d3a2021509f1d270f5
-
SHA1
5b50c87678e7c8b70f271c3cd135683ffd4a0498
-
SHA256
8feff55469c7d5bc9dbfaab62fe9b78843c3fabad5be532da632352fd18b549d
-
SHA512
d23311573363e0f8b9b1ba41b2c5b40b32627a75b2bedbd47f10ddf6efbf909be7ccb56086e1d585ee177f6177350fdcd4565d0adb6e8696ade9311303450817
-
SSDEEP
12288:+CuFjGTip659kZlslwXP4sp+ezCn2b4C:sFZwcTsOfppTzCC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-