General
-
Target
a6bf938384c116808ee849e15dfe627610056c03bf1626268bc88d25d35cfe79.exe
-
Size
704KB
-
Sample
231202-jegplaae62
-
MD5
326f131c3a7dcfb88881854fa5faad2e
-
SHA1
c2b4fbe4687c10b6c92acaf89e1f94ce60a253a5
-
SHA256
a6bf938384c116808ee849e15dfe627610056c03bf1626268bc88d25d35cfe79
-
SHA512
c1f599ee8fbc0dc6e14722d02cf4cb5fa8fc5cf038bd6135020ebc1c4998a56f2b404bd6172e51fe36976de78f4706a0cad5655c0a35dc1eb1464238e26a1bb7
-
SSDEEP
12288:4qfLYYZXTy4pgtcn6mblK18zrBE6NMpBuoMXo6TUr5wdFkMgzt8ro+:rXTjpgtOpKep9NUuocZBPB
Static task
static1
Behavioral task
behavioral1
Sample
a6bf938384c116808ee849e15dfe627610056c03bf1626268bc88d25d35cfe79.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a6bf938384c116808ee849e15dfe627610056c03bf1626268bc88d25d35cfe79.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.defalife.com.tr - Port:
587 - Username:
[email protected] - Password:
Defalife.124578
Extracted
agenttesla
Protocol: smtp- Host:
mail.defalife.com.tr - Port:
587 - Username:
[email protected] - Password:
Defalife.124578 - Email To:
[email protected]
Targets
-
-
Target
a6bf938384c116808ee849e15dfe627610056c03bf1626268bc88d25d35cfe79.exe
-
Size
704KB
-
MD5
326f131c3a7dcfb88881854fa5faad2e
-
SHA1
c2b4fbe4687c10b6c92acaf89e1f94ce60a253a5
-
SHA256
a6bf938384c116808ee849e15dfe627610056c03bf1626268bc88d25d35cfe79
-
SHA512
c1f599ee8fbc0dc6e14722d02cf4cb5fa8fc5cf038bd6135020ebc1c4998a56f2b404bd6172e51fe36976de78f4706a0cad5655c0a35dc1eb1464238e26a1bb7
-
SSDEEP
12288:4qfLYYZXTy4pgtcn6mblK18zrBE6NMpBuoMXo6TUr5wdFkMgzt8ro+:rXTjpgtOpKep9NUuocZBPB
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-