General
-
Target
tmp.exe
-
Size
644KB
-
Sample
231202-c7s5rshe82
-
MD5
219492f049fb6d224dc912fb1de2d515
-
SHA1
ecfbfb5a6714032f4c811601bf8146c1f580b58f
-
SHA256
6d3e0f4b400eeb388c288d1151c5051224f99497a522424f60d9cdcc63157cab
-
SHA512
7f7cf112ff91e0634728a42937051326c5810ef1fbf1b3b9e8a6847b9f34f2ebdb765e046ee4b61f6d286e75ada5cfd4db45eb876e2eb61e8ca9309844ee2878
-
SSDEEP
12288:8K361h61EWGqLia/AsN3xoiFyit3+hBSEvowv409EVjbEQ8q61:8vY7GUiasSnt3qBSE1ejbEQ8v
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win11-20231128-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.evantelamin.top - Port:
587 - Username:
[email protected] - Password:
=&8=7!eO;gm@ - Email To:
[email protected]
Targets
-
-
Target
tmp.exe
-
Size
644KB
-
MD5
219492f049fb6d224dc912fb1de2d515
-
SHA1
ecfbfb5a6714032f4c811601bf8146c1f580b58f
-
SHA256
6d3e0f4b400eeb388c288d1151c5051224f99497a522424f60d9cdcc63157cab
-
SHA512
7f7cf112ff91e0634728a42937051326c5810ef1fbf1b3b9e8a6847b9f34f2ebdb765e046ee4b61f6d286e75ada5cfd4db45eb876e2eb61e8ca9309844ee2878
-
SSDEEP
12288:8K361h61EWGqLia/AsN3xoiFyit3+hBSEvowv409EVjbEQ8q61:8vY7GUiasSnt3qBSE1ejbEQ8v
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-