General
-
Target
INVOICE1.exe
-
Size
141KB
-
Sample
241014-jhfxgasbma
-
MD5
a95881a2ba2d6d3fbc144d3c1edffe7d
-
SHA1
0ba33b11cd141b3583bab5d5d59b99c470cdfed1
-
SHA256
4cc555d5f883d5970deca28b1f2e50c7adb4989a8caa653ad496d587e47f0f7c
-
SHA512
1820b626adf3034f21f1517ab5f150e8c90e671f90c001f827a2b000b5abe8c504eeafd0b57b827ce1e82a651f30513e515f2a69f2f96ce62207645bf4c2bd19
-
SSDEEP
3072:ns/N4OotOvCHzy+OJf3uq+BD9R0XSusK8q5wa8xx/:ns/N4OotOvCHzyz2q+BD9RS3e
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE1.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6828335029:AAHOq6iD_8Eg5u6FhmWF0NHPcKj1jLGtRk4/
Targets
-
-
Target
INVOICE1.exe
-
Size
141KB
-
MD5
a95881a2ba2d6d3fbc144d3c1edffe7d
-
SHA1
0ba33b11cd141b3583bab5d5d59b99c470cdfed1
-
SHA256
4cc555d5f883d5970deca28b1f2e50c7adb4989a8caa653ad496d587e47f0f7c
-
SHA512
1820b626adf3034f21f1517ab5f150e8c90e671f90c001f827a2b000b5abe8c504eeafd0b57b827ce1e82a651f30513e515f2a69f2f96ce62207645bf4c2bd19
-
SSDEEP
3072:ns/N4OotOvCHzy+OJf3uq+BD9R0XSusK8q5wa8xx/:ns/N4OotOvCHzyz2q+BD9RS3e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-