General
-
Target
90719bd270486dde2f0b8f22924d10907f8d9e10ec7ba8bbc70e7e3dff5e1658
-
Size
1.5MB
-
Sample
250114-bvabfsspfz
-
MD5
9514c4132fbe194c4ae5ce0113703f78
-
SHA1
3911da4089531677b83e1c5ad690449040c7c324
-
SHA256
90719bd270486dde2f0b8f22924d10907f8d9e10ec7ba8bbc70e7e3dff5e1658
-
SHA512
3b267ca3a06a8c9e737742bd5fbdea26fb7520a9ebb1c260e873d3d40daf16907c87ca4e8a42784d33fd8fdf322d17078c835a6c2ae13e3cf8cff5fa5b60af98
-
SSDEEP
24576:Kln9OjYMsGYCUF3nv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:Kl9u57UF3hjLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
90719bd270486dde2f0b8f22924d10907f8d9e10ec7ba8bbc70e7e3dff5e1658.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
90719bd270486dde2f0b8f22924d10907f8d9e10ec7ba8bbc70e7e3dff5e1658.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/sendDocument
Targets
-
-
Target
90719bd270486dde2f0b8f22924d10907f8d9e10ec7ba8bbc70e7e3dff5e1658
-
Size
1.5MB
-
MD5
9514c4132fbe194c4ae5ce0113703f78
-
SHA1
3911da4089531677b83e1c5ad690449040c7c324
-
SHA256
90719bd270486dde2f0b8f22924d10907f8d9e10ec7ba8bbc70e7e3dff5e1658
-
SHA512
3b267ca3a06a8c9e737742bd5fbdea26fb7520a9ebb1c260e873d3d40daf16907c87ca4e8a42784d33fd8fdf322d17078c835a6c2ae13e3cf8cff5fa5b60af98
-
SSDEEP
24576:Kln9OjYMsGYCUF3nv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:Kl9u57UF3hjLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-