General
-
Target
7cca941ad6d739a10a8514b746e2cdf543cd27884bd0f3c38a082eedff9114be
-
Size
891KB
-
Sample
250110-bkpcmawqfy
-
MD5
f1aaa542043f9036dedf86135d348af3
-
SHA1
bd023b2faeda83386e6a31c431233ee7a6989d76
-
SHA256
7cca941ad6d739a10a8514b746e2cdf543cd27884bd0f3c38a082eedff9114be
-
SHA512
6f23ee0aee517e2524b3d3503e5c74251dc2298f205ccf4700955be1640de7beaa0d1a448929f05dede7fad7ff4c002fa79db78b716eb669d3d419c59572c767
-
SSDEEP
12288:uuHzHz4p7GLkTdRx3p3T0R65pMfGWuOHD7qV02uDTdtMrBtbbj+ymKz59eM9g:uqzHzTIF0RcpnFmD7vndajZ9z59eT
Static task
static1
Behavioral task
behavioral1
Sample
7cca941ad6d739a10a8514b746e2cdf543cd27884bd0f3c38a082eedff9114be.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1620445910:AAF2v81NoINJsu_XXnpGet1YDm-NxnznaIE/sendDocument
Targets
-
-
Target
7cca941ad6d739a10a8514b746e2cdf543cd27884bd0f3c38a082eedff9114be
-
Size
891KB
-
MD5
f1aaa542043f9036dedf86135d348af3
-
SHA1
bd023b2faeda83386e6a31c431233ee7a6989d76
-
SHA256
7cca941ad6d739a10a8514b746e2cdf543cd27884bd0f3c38a082eedff9114be
-
SHA512
6f23ee0aee517e2524b3d3503e5c74251dc2298f205ccf4700955be1640de7beaa0d1a448929f05dede7fad7ff4c002fa79db78b716eb669d3d419c59572c767
-
SSDEEP
12288:uuHzHz4p7GLkTdRx3p3T0R65pMfGWuOHD7qV02uDTdtMrBtbbj+ymKz59eM9g:uqzHzTIF0RcpnFmD7vndajZ9z59eT
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-