General
-
Target
6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe
-
Size
686KB
-
Sample
231201-wqgj7aef4z
-
MD5
c16a6f4e8df4c64ef57fb7d5117edf7c
-
SHA1
74668c393f0d8a0d2c8c2dc469453de74d93ca87
-
SHA256
6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944
-
SHA512
b4e676704d1a8f256334b85e6c9a1847ae78a2a7ec714b03e67e9c58b194491d16fa3b268475b89ddb01b74d0775f397ea26b9ddcb8f4e3353511490b0a87760
-
SSDEEP
12288:pYcopox4vvvoakgLfBpnXQVbCYnm1CQ+XfD0igd2pwDXkQz6:ReLvoIBpnKb5DQQ0igYQkQW
Static task
static1
Behavioral task
behavioral1
Sample
6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ardsmmm.com - Port:
587 - Username:
[email protected] - Password:
Ard2015** - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.ardsmmm.com - Port:
587 - Username:
[email protected] - Password:
Ard2015**
Targets
-
-
Target
6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe
-
Size
686KB
-
MD5
c16a6f4e8df4c64ef57fb7d5117edf7c
-
SHA1
74668c393f0d8a0d2c8c2dc469453de74d93ca87
-
SHA256
6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944
-
SHA512
b4e676704d1a8f256334b85e6c9a1847ae78a2a7ec714b03e67e9c58b194491d16fa3b268475b89ddb01b74d0775f397ea26b9ddcb8f4e3353511490b0a87760
-
SSDEEP
12288:pYcopox4vvvoakgLfBpnXQVbCYnm1CQ+XfD0igd2pwDXkQz6:ReLvoIBpnKb5DQQ0igYQkQW
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-