General
-
Target
5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8
-
Size
301KB
-
Sample
230807-cs2hlaec8t
-
MD5
41279bcbfec0ec860dd662ea72006150
-
SHA1
06a32a46b9f2c49766f7f559c267571277fa6b7d
-
SHA256
5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8
-
SHA512
83ac2355c10bfc0c5a3eda87b243069b1a5bb3d84079a1d4e82a5da917b4c97799ea30be8eab6f8598768d62b2c73cb2ecfc46ae59dca3e17a6befc234e10154
-
SSDEEP
6144:/Ya61fAcGUqFKEi33DnhflyfeqR6SKvGChol6/lj:/YHZGrKEw3Dn7jqR7PCWe
Static task
static1
Behavioral task
behavioral1
Sample
5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@#
Targets
-
-
Target
5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8
-
Size
301KB
-
MD5
41279bcbfec0ec860dd662ea72006150
-
SHA1
06a32a46b9f2c49766f7f559c267571277fa6b7d
-
SHA256
5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8
-
SHA512
83ac2355c10bfc0c5a3eda87b243069b1a5bb3d84079a1d4e82a5da917b4c97799ea30be8eab6f8598768d62b2c73cb2ecfc46ae59dca3e17a6befc234e10154
-
SSDEEP
6144:/Ya61fAcGUqFKEi33DnhflyfeqR6SKvGChol6/lj:/YHZGrKEw3Dn7jqR7PCWe
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-