General
-
Target
6c510957c26db484e750d3834eb7a071.exe
-
Size
470KB
-
Sample
231101-n23mssfh4s
-
MD5
6c510957c26db484e750d3834eb7a071
-
SHA1
8addfedd831f65e85bd9bb7bc27f04a69d45dcf2
-
SHA256
200a8761ad54a3eeb3039a37d654f3be76efcdd5a51b1f6f9f4b9584dc998e1e
-
SHA512
29ed05ad27bba9286ae421ca2eea0634648f23e045641875be5574bd5dd2e31ffbdb07a61e61c0b2f37163994572bc04c29ddb65ea5881acd22d3761c5ecd6d9
-
SSDEEP
12288:wPqSSSrsBhphNyXk8ejoPo0sBwT/BIxdSG1rfUPeAXa6:+UBhphNN816U+jU2AK6
Static task
static1
Behavioral task
behavioral1
Sample
6c510957c26db484e750d3834eb7a071.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
6c510957c26db484e750d3834eb7a071.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.nysainternational.in - Port:
587 - Username:
[email protected] - Password:
Bewaqoof123@ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.nysainternational.in - Port:
587 - Username:
[email protected] - Password:
Bewaqoof123@
Targets
-
-
Target
6c510957c26db484e750d3834eb7a071.exe
-
Size
470KB
-
MD5
6c510957c26db484e750d3834eb7a071
-
SHA1
8addfedd831f65e85bd9bb7bc27f04a69d45dcf2
-
SHA256
200a8761ad54a3eeb3039a37d654f3be76efcdd5a51b1f6f9f4b9584dc998e1e
-
SHA512
29ed05ad27bba9286ae421ca2eea0634648f23e045641875be5574bd5dd2e31ffbdb07a61e61c0b2f37163994572bc04c29ddb65ea5881acd22d3761c5ecd6d9
-
SSDEEP
12288:wPqSSSrsBhphNyXk8ejoPo0sBwT/BIxdSG1rfUPeAXa6:+UBhphNN816U+jU2AK6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-