General
-
Target
2f0cfa1b5ad96b9d08319bde2c660b2eee480089c521ef47bbda609937367698.exe
-
Size
693KB
-
Sample
230803-py3dased7w
-
MD5
486055cd6ce24e4760b4210f832b779d
-
SHA1
e0a37a78dc0c90409269565c9297ec7d6361f941
-
SHA256
2f0cfa1b5ad96b9d08319bde2c660b2eee480089c521ef47bbda609937367698
-
SHA512
d95b5c4b90143634b5e3086b44ced4128a0ef5f17d3cac92cfd078119c882964b81a3702c72f2dc5b75ce1bd852adebaba4fc958b515eba667a7552e57688c28
-
SSDEEP
12288:tXiQrjS2iNtO6JuAvverND2yaI3qCYvsLYKHnvwAq:hiQrjS1ZJPvQp2W3/pLYKH1q
Static task
static1
Behavioral task
behavioral1
Sample
2f0cfa1b5ad96b9d08319bde2c660b2eee480089c521ef47bbda609937367698.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2f0cfa1b5ad96b9d08319bde2c660b2eee480089c521ef47bbda609937367698.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.adanaatlispor.com - Port:
587 - Username:
[email protected] - Password:
OxEUYnE2jx - Email To:
[email protected]
Targets
-
-
Target
2f0cfa1b5ad96b9d08319bde2c660b2eee480089c521ef47bbda609937367698.exe
-
Size
693KB
-
MD5
486055cd6ce24e4760b4210f832b779d
-
SHA1
e0a37a78dc0c90409269565c9297ec7d6361f941
-
SHA256
2f0cfa1b5ad96b9d08319bde2c660b2eee480089c521ef47bbda609937367698
-
SHA512
d95b5c4b90143634b5e3086b44ced4128a0ef5f17d3cac92cfd078119c882964b81a3702c72f2dc5b75ce1bd852adebaba4fc958b515eba667a7552e57688c28
-
SSDEEP
12288:tXiQrjS2iNtO6JuAvverND2yaI3qCYvsLYKHnvwAq:hiQrjS1ZJPvQp2W3/pLYKH1q
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-