General
-
Target
Order129845.exe
-
Size
852KB
-
Sample
241217-jc5nmsvnbq
-
MD5
51c79a3875d045fd9636fea680d5719e
-
SHA1
b5b196b5f40e412f8eba6cf70afe7c3446e66699
-
SHA256
c18723dfaf550c484bb8b38bcfed28f0ac84a207bb1155a5e39cf75f7224ff6d
-
SHA512
eb7b617220a89818e279764fe730557ca59fa273dcf886135f7fb1ff46815f5b11b1c1de78da4fc22f88f87b598f35c1a7a723779074c9379de08fbe3cbb949d
-
SSDEEP
24576:sgyz72KGKLDlej6TOuorEjnuJ4GVq/+O:sgyzC7WpeflmnuJ4Gk2O
Static task
static1
Behavioral task
behavioral1
Sample
Order129845.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6398266815:AAHsI6E2fxSDRjUIFWFTj-ZFBkT9Dm19_Mo/
Targets
-
-
Target
Order129845.exe
-
Size
852KB
-
MD5
51c79a3875d045fd9636fea680d5719e
-
SHA1
b5b196b5f40e412f8eba6cf70afe7c3446e66699
-
SHA256
c18723dfaf550c484bb8b38bcfed28f0ac84a207bb1155a5e39cf75f7224ff6d
-
SHA512
eb7b617220a89818e279764fe730557ca59fa273dcf886135f7fb1ff46815f5b11b1c1de78da4fc22f88f87b598f35c1a7a723779074c9379de08fbe3cbb949d
-
SSDEEP
24576:sgyz72KGKLDlej6TOuorEjnuJ4GVq/+O:sgyzC7WpeflmnuJ4Gk2O
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-