General
-
Target
ca2e0c4c5d77ac010eac33e309b31022a08125703ac87a71c319ab50d946aa6b
-
Size
675KB
-
Sample
211021-1apm3sagf5
-
MD5
6c11f38adec40c226ba26d9d0d505b45
-
SHA1
7ae903b71388e162dc4e10f65854cfb45de6d4fe
-
SHA256
ca2e0c4c5d77ac010eac33e309b31022a08125703ac87a71c319ab50d946aa6b
-
SHA512
b01c32e389bd0d7a55777e023f0e29f39158ba762f24eabdc61d3ea6a34301da4ea1fff5705101d5a03161acf5088f69d6db3c717ce8ec055a3d746f0a81d45f
Static task
static1
Behavioral task
behavioral1
Sample
ca2e0c4c5d77ac010eac33e309b31022a08125703ac87a71c319ab50d946aa6b.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.abaamap.com.mx - Port:
587 - Username:
[email protected] - Password:
6.9)bx6}m*k}
Targets
-
-
Target
ca2e0c4c5d77ac010eac33e309b31022a08125703ac87a71c319ab50d946aa6b
-
Size
675KB
-
MD5
6c11f38adec40c226ba26d9d0d505b45
-
SHA1
7ae903b71388e162dc4e10f65854cfb45de6d4fe
-
SHA256
ca2e0c4c5d77ac010eac33e309b31022a08125703ac87a71c319ab50d946aa6b
-
SHA512
b01c32e389bd0d7a55777e023f0e29f39158ba762f24eabdc61d3ea6a34301da4ea1fff5705101d5a03161acf5088f69d6db3c717ce8ec055a3d746f0a81d45f
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Suspicious use of SetThreadContext
-