General
-
Target
rScan_0984829339_PDF.exe
-
Size
215KB
-
Sample
241015-x8cvdsxarm
-
MD5
a89dce2412407f0bd1f4b9e575545aeb
-
SHA1
9ad65f7f6252c2df5c97b44000d12c988ec7d4a1
-
SHA256
c8c4a0f5bc0278f9392a4356ac121458f0f4d10420f65b468e7556b08c84ff5e
-
SHA512
74577fb4db7127dd8137dccaab8d05a5f4254acd19d5c6219a60174010e5d4dad5a688b9ee61727972f503eb33e59ec10b3d84871ced3ca4ae10e59669140f61
-
SSDEEP
3072:vt18yO+SfeIWIWUE5fGEgHmUfjPGBTOqAnulg7eQ5RxDkktr/8G1doRb8JJUAJU2:V1z9IWbnhP8QQk41E
Static task
static1
Behavioral task
behavioral1
Sample
rScan_0984829339_PDF.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7162202130:AAHTxdkbyFCUMWCzyf9jutDYYrL6rqEAva4/
Targets
-
-
Target
rScan_0984829339_PDF.exe
-
Size
215KB
-
MD5
a89dce2412407f0bd1f4b9e575545aeb
-
SHA1
9ad65f7f6252c2df5c97b44000d12c988ec7d4a1
-
SHA256
c8c4a0f5bc0278f9392a4356ac121458f0f4d10420f65b468e7556b08c84ff5e
-
SHA512
74577fb4db7127dd8137dccaab8d05a5f4254acd19d5c6219a60174010e5d4dad5a688b9ee61727972f503eb33e59ec10b3d84871ced3ca4ae10e59669140f61
-
SSDEEP
3072:vt18yO+SfeIWIWUE5fGEgHmUfjPGBTOqAnulg7eQ5RxDkktr/8G1doRb8JJUAJU2:V1z9IWbnhP8QQk41E
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Suspicious use of SetThreadContext
-