General
-
Target
300d6c69c0e497397e6aef2d2a098fbea72d5f1589d5c55111c3bd35efb69193
-
Size
2.5MB
-
Sample
250112-bwcsza1mer
-
MD5
32f0763bac0065d935eeb2d239cb53fc
-
SHA1
b894ebdec9d4bcda45ebb08ea9f718250883a2bb
-
SHA256
300d6c69c0e497397e6aef2d2a098fbea72d5f1589d5c55111c3bd35efb69193
-
SHA512
ff31a9814d61638fb1278215fdc7ceaa9d6c89dcef94634ef22a12b7db1d9896efa58c11c01f09818fc9b54d5e1e3552a65f2b770c283dfe180aada7756f620d
-
SSDEEP
49152:NXORMzDisxk6tAxnrrRF24hjZMIznhDp+HMKchyLFLFKx3HclBQbUtRfC4FrYct2:NXORMzAnrrRF24hjZMIznhDv7yLFLFKt
Static task
static1
Behavioral task
behavioral1
Sample
300d6c69c0e497397e6aef2d2a098fbea72d5f1589d5c55111c3bd35efb69193.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
300d6c69c0e497397e6aef2d2a098fbea72d5f1589d5c55111c3bd35efb69193.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1611823422:AAE2tV5jSK2FOUbFQRNzZUsuQBkBGzgEX5U/sendDocument
Targets
-
-
Target
300d6c69c0e497397e6aef2d2a098fbea72d5f1589d5c55111c3bd35efb69193
-
Size
2.5MB
-
MD5
32f0763bac0065d935eeb2d239cb53fc
-
SHA1
b894ebdec9d4bcda45ebb08ea9f718250883a2bb
-
SHA256
300d6c69c0e497397e6aef2d2a098fbea72d5f1589d5c55111c3bd35efb69193
-
SHA512
ff31a9814d61638fb1278215fdc7ceaa9d6c89dcef94634ef22a12b7db1d9896efa58c11c01f09818fc9b54d5e1e3552a65f2b770c283dfe180aada7756f620d
-
SSDEEP
49152:NXORMzDisxk6tAxnrrRF24hjZMIznhDp+HMKchyLFLFKx3HclBQbUtRfC4FrYct2:NXORMzAnrrRF24hjZMIznhDv7yLFLFKt
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-