General
-
Target
1283d97b6ea64694f4b8a9666c59f84b91b4bd3bfb6d2e6991280dca83fba3ac.exe
-
Size
1.0MB
-
Sample
241219-dxklbavqcx
-
MD5
7a04f0461af10cd413dcb71d7130bd89
-
SHA1
7e4f8a63c7135125eae9605ff2e837fe1335da5f
-
SHA256
1283d97b6ea64694f4b8a9666c59f84b91b4bd3bfb6d2e6991280dca83fba3ac
-
SHA512
9ed35559bd81f27355fea26895eceb3ff7cc885850d8d996a7b9a586d5a71f061c389e141ebd0a9efecd30988845321906d3d80a5b3006054e23139f31ee4e49
-
SSDEEP
24576:Ku6J33O0c+JY5UZ+XC0kGso6Faaa1yjxHWYR:8u0c++OCvkGs9FaaagwYR
Static task
static1
Behavioral task
behavioral1
Sample
1283d97b6ea64694f4b8a9666c59f84b91b4bd3bfb6d2e6991280dca83fba3ac.exe
Resource
win7-20240729-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7220431026:AAHszs0XzPcajloTXlLJDVKab99uNUvPaok/
Targets
-
-
Target
1283d97b6ea64694f4b8a9666c59f84b91b4bd3bfb6d2e6991280dca83fba3ac.exe
-
Size
1.0MB
-
MD5
7a04f0461af10cd413dcb71d7130bd89
-
SHA1
7e4f8a63c7135125eae9605ff2e837fe1335da5f
-
SHA256
1283d97b6ea64694f4b8a9666c59f84b91b4bd3bfb6d2e6991280dca83fba3ac
-
SHA512
9ed35559bd81f27355fea26895eceb3ff7cc885850d8d996a7b9a586d5a71f061c389e141ebd0a9efecd30988845321906d3d80a5b3006054e23139f31ee4e49
-
SSDEEP
24576:Ku6J33O0c+JY5UZ+XC0kGso6Faaa1yjxHWYR:8u0c++OCvkGs9FaaagwYR
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-