Static task
static1
Behavioral task
behavioral1
Sample
greattastesmb.ca_wp_content_plugins_duplicator_files_elb.exe.malw.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
greattastesmb.ca_wp_content_plugins_duplicator_files_elb.exe.malw.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
greattastesmb.ca_wp_content_plugins_duplicator_files_elb.exe.malw
-
Size
277KB
-
MD5
406de95a9dd661c24493b0d207c25a99
-
SHA1
4798b6987d2cf926b58fd462605449febfc85310
-
SHA256
ff11cc320a56b5aa8cdfc8ce4bbd78926624ebdac7514446556c28feebed0e15
-
SHA512
8a43065aefaaa263e5629002d9603cb7c18eb4d8f04845d66272273a90fe5e04ee4ae9c9f7488563f7773727f0d4fb6823d43774f8e3ed0f594f0d1196732a33
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
terminal6.veeblehosting.com - Port:
587 - Username:
[email protected] - Password:
HdaD#~1W)pw9
Signatures
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule sample family_agenttesla -
Agenttesla family
Files
-
greattastesmb.ca_wp_content_plugins_duplicator_files_elb.exe.malw.exe windows x86