Static task
static1
Behavioral task
behavioral1
Sample
greattastesmb.ca_wp_content_plugins_duplicator_files_men.exe.malw.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
greattastesmb.ca_wp_content_plugins_duplicator_files_men.exe.malw.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
greattastesmb.ca_wp_content_plugins_duplicator_files_men.exe.malw
-
Size
278KB
-
MD5
ed24608d27cec38b55d21e4c57cc186f
-
SHA1
851390cd6e3ba5b29ab7ef4f973aaceca7c183d6
-
SHA256
c69c40f28d754c4f04187140098e71d5958b8357dad6860dc87fbb3d3029145a
-
SHA512
629fdc152e4c3f87a01b83894357044f87bcac255e8dda1b98da0fa079302f0225d18e8cabb0bc7db7fd74e25bf39cbb363641744e72ecaca3bf486fcd6dfe88
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
terminal6.veeblehosting.com - Port:
587 - Username:
[email protected] - Password:
b#&fPTB~hQvW
Signatures
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule sample family_agenttesla -
Agenttesla family
Files
-
greattastesmb.ca_wp_content_plugins_duplicator_files_men.exe.malw.exe windows x86