General
-
Target
a34bea7d2548f026b7d5f02f486e2d87b39f58e263684b298bdbdc869a0c2630.exe
-
Size
1.2MB
-
Sample
241008-q7jg8atcmf
-
MD5
6b5283e3930b0c92dc191d895e9d20ed
-
SHA1
682acb9ce6b59f5bcc815e26525c502bc56efc5b
-
SHA256
a34bea7d2548f026b7d5f02f486e2d87b39f58e263684b298bdbdc869a0c2630
-
SHA512
bf92166a48f09fc1958f4ee07a15e3a00037110975f339958bdec2de6e5875cc00ff06b94552eb979ff2d143277e9f218568d4c79c224619d4837bac4e1b8e88
-
SSDEEP
24576:1H0Hw8t4Uimln8XQwg4O6nPcwwW2n/HrEkGR7O:F0Hw8tzNB8OsfDkKy
Static task
static1
Behavioral task
behavioral1
Sample
a34bea7d2548f026b7d5f02f486e2d87b39f58e263684b298bdbdc869a0c2630.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7220431026:AAHszs0XzPcajloTXlLJDVKab99uNUvPaok/
Targets
-
-
Target
a34bea7d2548f026b7d5f02f486e2d87b39f58e263684b298bdbdc869a0c2630.exe
-
Size
1.2MB
-
MD5
6b5283e3930b0c92dc191d895e9d20ed
-
SHA1
682acb9ce6b59f5bcc815e26525c502bc56efc5b
-
SHA256
a34bea7d2548f026b7d5f02f486e2d87b39f58e263684b298bdbdc869a0c2630
-
SHA512
bf92166a48f09fc1958f4ee07a15e3a00037110975f339958bdec2de6e5875cc00ff06b94552eb979ff2d143277e9f218568d4c79c224619d4837bac4e1b8e88
-
SSDEEP
24576:1H0Hw8t4Uimln8XQwg4O6nPcwwW2n/HrEkGR7O:F0Hw8tzNB8OsfDkKy
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Suspicious use of SetThreadContext
-