General
-
Target
e093e71413f63cbac94396bc85ad3a789dfd7d9f2729918fa3ce5c4ddb295eb3
-
Size
1.1MB
-
Sample
241129-bmvbnatjgl
-
MD5
ded21ced6e36a01c2f157c6bb5e14b27
-
SHA1
d7134b5df42c9fff7394db7259cbc2b4c312e037
-
SHA256
e093e71413f63cbac94396bc85ad3a789dfd7d9f2729918fa3ce5c4ddb295eb3
-
SHA512
ae496f6825b9496726d69ea6b0764be3a43541674cdca0b43e331f1b1d6d02cffb7a6622a69851ef1b59d823b74c369339d9df5a2d07cf211612bfebaecefc01
-
SSDEEP
24576:w9IrPEUBIh+J+vDNSTG2bydfpRBcK/F50V2yZp5ivUo:weYcrpUfBcK/F222p5K
Static task
static1
Behavioral task
behavioral1
Sample
e093e71413f63cbac94396bc85ad3a789dfd7d9f2729918fa3ce5c4ddb295eb3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e093e71413f63cbac94396bc85ad3a789dfd7d9f2729918fa3ce5c4ddb295eb3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6971300919:AAHJwb_yacm_mPsqnl_qqj2BgRe3exgwgXw/
Targets
-
-
Target
e093e71413f63cbac94396bc85ad3a789dfd7d9f2729918fa3ce5c4ddb295eb3
-
Size
1.1MB
-
MD5
ded21ced6e36a01c2f157c6bb5e14b27
-
SHA1
d7134b5df42c9fff7394db7259cbc2b4c312e037
-
SHA256
e093e71413f63cbac94396bc85ad3a789dfd7d9f2729918fa3ce5c4ddb295eb3
-
SHA512
ae496f6825b9496726d69ea6b0764be3a43541674cdca0b43e331f1b1d6d02cffb7a6622a69851ef1b59d823b74c369339d9df5a2d07cf211612bfebaecefc01
-
SSDEEP
24576:w9IrPEUBIh+J+vDNSTG2bydfpRBcK/F50V2yZp5ivUo:weYcrpUfBcK/F222p5K
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1