General
-
Target
B (3).exe
-
Size
686KB
-
Sample
231205-h4d5bshg2v
-
MD5
dec40a2b97404b644f142979f8b7107a
-
SHA1
45fa65b15e2f206ea917cc1877365e7fcba39731
-
SHA256
9ee7811e79cf1f1f76aadb17175227bf172b21ed84a54a53ef98a1f4695f75ba
-
SHA512
9c33d35ead9764e26a4499d88a5dcba7795205e715ca8b739b1dd4b9b071e777f2713d8bec17fe0c52e03e51952c90e2154e35d5b49d6f7b03a2b8b5341b7acb
-
SSDEEP
12288:Cn/7eVSw4/eC9J4j/Nw3ghMM7s16pqOO9fzClLg6acbV1E7lrtWYOQmbCp:Cn/yVk/eYSj1IghBpqb1zq3Pbgx
Static task
static1
Behavioral task
behavioral1
Sample
B (3).exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
B (3).exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
EwQnrCo8 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
EwQnrCo8
Targets
-
-
Target
B (3).exe
-
Size
686KB
-
MD5
dec40a2b97404b644f142979f8b7107a
-
SHA1
45fa65b15e2f206ea917cc1877365e7fcba39731
-
SHA256
9ee7811e79cf1f1f76aadb17175227bf172b21ed84a54a53ef98a1f4695f75ba
-
SHA512
9c33d35ead9764e26a4499d88a5dcba7795205e715ca8b739b1dd4b9b071e777f2713d8bec17fe0c52e03e51952c90e2154e35d5b49d6f7b03a2b8b5341b7acb
-
SSDEEP
12288:Cn/7eVSw4/eC9J4j/Nw3ghMM7s16pqOO9fzClLg6acbV1E7lrtWYOQmbCp:Cn/yVk/eYSj1IghBpqb1zq3Pbgx
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-