General
-
Target
NEAS.c9391020e00e26ae0242e2bce06f6def9c04bbaa3b898d36c6e7772726a60de3.exe
-
Size
253KB
-
Sample
231111-m3cmbseh72
-
MD5
684218d826981df4a3ed247663a1c726
-
SHA1
5aa6a53b3f6573d2da604347b0b5c16dfc9db892
-
SHA256
c9391020e00e26ae0242e2bce06f6def9c04bbaa3b898d36c6e7772726a60de3
-
SHA512
9159e62e8289140834cf84586d02b21178b40929d5a08fc6bc6eaac7a7152607b59243f7b2aefa179908ae527a1b5c3e17593b67e5c392264607dd457afcc509
-
SSDEEP
3072:FOiTYp32ujX2MIfAJq8EfBdlx0uymOARPSXPftqq7IdsRYbMet7llE9cAjAO3Jvx:tgw8sdlx0AgXHtfnRYQeFla9cAj5vUuB
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.c9391020e00e26ae0242e2bce06f6def9c04bbaa3b898d36c6e7772726a60de3.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.c9391020e00e26ae0242e2bce06f6def9c04bbaa3b898d36c6e7772726a60de3.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server1.sqsendy.shop - Port:
587 - Username:
[email protected] - Password:
{f];qthoiBBW - Email To:
[email protected]
Targets
-
-
Target
NEAS.c9391020e00e26ae0242e2bce06f6def9c04bbaa3b898d36c6e7772726a60de3.exe
-
Size
253KB
-
MD5
684218d826981df4a3ed247663a1c726
-
SHA1
5aa6a53b3f6573d2da604347b0b5c16dfc9db892
-
SHA256
c9391020e00e26ae0242e2bce06f6def9c04bbaa3b898d36c6e7772726a60de3
-
SHA512
9159e62e8289140834cf84586d02b21178b40929d5a08fc6bc6eaac7a7152607b59243f7b2aefa179908ae527a1b5c3e17593b67e5c392264607dd457afcc509
-
SSDEEP
3072:FOiTYp32ujX2MIfAJq8EfBdlx0uymOARPSXPftqq7IdsRYbMet7llE9cAjAO3Jvx:tgw8sdlx0AgXHtfnRYQeFla9cAj5vUuB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-