General
-
Target
3ba9c41b4829d2d76f4521c98e6ace137c579ac83a421b914aa6d3be9ebe18ed
-
Size
954KB
-
Sample
241121-j7arra1clm
-
MD5
20ab1cb130b4189daa047201a7cfecda
-
SHA1
0b02d21b537d43a7c24d9b15f544f63ddc9f52ce
-
SHA256
3ba9c41b4829d2d76f4521c98e6ace137c579ac83a421b914aa6d3be9ebe18ed
-
SHA512
8e4e40f9607a2f7f404a6a15c4f0f7e410e0d1a032cbe2bfd101c7e6d219180bffa5086368a3c137401479113f0649509ad532641cd174cf8d1c63f21857b54b
-
SSDEEP
6144:XxiBwnO+uh4ATWsg8pDk8SiXwpafnhh4s22G2+zeQboFpHU/+zLM7ymoHmRwXZtB:XJuhoM2Ip7
Static task
static1
Behavioral task
behavioral1
Sample
3ba9c41b4829d2d76f4521c98e6ace137c579ac83a421b914aa6d3be9ebe18ed.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6095027586:AAEswb54mjqujtIp9JrD4vONOT4f7nY0Bzo/
Targets
-
-
Target
3ba9c41b4829d2d76f4521c98e6ace137c579ac83a421b914aa6d3be9ebe18ed
-
Size
954KB
-
MD5
20ab1cb130b4189daa047201a7cfecda
-
SHA1
0b02d21b537d43a7c24d9b15f544f63ddc9f52ce
-
SHA256
3ba9c41b4829d2d76f4521c98e6ace137c579ac83a421b914aa6d3be9ebe18ed
-
SHA512
8e4e40f9607a2f7f404a6a15c4f0f7e410e0d1a032cbe2bfd101c7e6d219180bffa5086368a3c137401479113f0649509ad532641cd174cf8d1c63f21857b54b
-
SSDEEP
6144:XxiBwnO+uh4ATWsg8pDk8SiXwpafnhh4s22G2+zeQboFpHU/+zLM7ymoHmRwXZtB:XJuhoM2Ip7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-