General
-
Target
D777E07E8EB41600B4C53A06B94812C96AFE898EEFB00CDC6D867C884DFC951A
-
Size
576KB
-
Sample
221123-r166dada7s
-
MD5
09a5a24730fafacb4ff3373a1eaa46fa
-
SHA1
3d41e9d5adbfcea45aad11f3b7abf75aa0e04309
-
SHA256
d777e07e8eb41600b4c53a06b94812c96afe898eefb00cdc6d867c884dfc951a
-
SHA512
abaaf4765413708f41d6e5e3981d2e2cbc8755030288792174ff9bc72455e959e7d27c3a5f69ce69278a20cd75d6b240f0bee4c30f20c754ad7be76e669e2ca5
-
SSDEEP
12288:e5t/5adfn9lJ7+Dz19Q5tnC9rEGQXNFFUXbigEh463G:e5Ho1lJAz19QDC9IXNFFUXWZW63G
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA INVOICE-021&024.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
PROFORMA INVOICE-021&024.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.obynnehhhan.com - Port:
587 - Username:
[email protected] - Password:
G$MUuYG3
Targets
-
-
Target
PROFORMA INVOICE-021&024.exe
-
Size
790KB
-
MD5
043a4e8ecc28687716d84bd0e91558b2
-
SHA1
4292192ed5bf6475de6ab5160f6b7a3e0ea6fe28
-
SHA256
b74d3621bbd10bcf7512d3a54a9625ee1ebd11d4351dd54fdd8dce4f36ca57b9
-
SHA512
d5e4b3ac6ccaa4ad36253aa1da31e67bd9d60d46faff3dc1968a1410970ccb2a59d83a4ad873fd568ea77ba3a55f7c43136b209f0ef43395e8dd571a1f26dbca
-
SSDEEP
12288:rxwDU1ezM/uL99H+lxVbQ5t7s9PWQQZNFFCV5i8Ehb:dmA699MxVbQDo9wZNFFCVU9h
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-