General
-
Target
e-dekont_html.exe
-
Size
353KB
-
Sample
231205-h4ee4aaa85
-
MD5
89d8e33862254ab0164efaf6efbaff1c
-
SHA1
68f019bca5d212d7c6dacecc320c188ed91bb6df
-
SHA256
ccd1a1a8894135d74b09b38078cb1c74310a32640be2db9c14957edd830f0bff
-
SHA512
d8e5fc48150ed622e9b883cbe55f496a489fa1761300ef0dbda41abe21af2d95b3b4b3ee308bc64de6197979f74675840de6f1248387481abd866e40bdefdd47
-
SSDEEP
6144:QBlL/wyXteRAe8yHzoXERIC20hNTcYa9MpETitvyhbduzQJ2183Ozrjm4Rm3W4nG:iuAteRAe8m2FV0hNTVGMssvyhbdu0g1t
Static task
static1
Behavioral task
behavioral1
Sample
e-dekont_html.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
e-dekont_html.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.nmsltd.com.tr - Port:
587 - Username:
[email protected] - Password:
nms190019
Targets
-
-
Target
e-dekont_html.exe
-
Size
353KB
-
MD5
89d8e33862254ab0164efaf6efbaff1c
-
SHA1
68f019bca5d212d7c6dacecc320c188ed91bb6df
-
SHA256
ccd1a1a8894135d74b09b38078cb1c74310a32640be2db9c14957edd830f0bff
-
SHA512
d8e5fc48150ed622e9b883cbe55f496a489fa1761300ef0dbda41abe21af2d95b3b4b3ee308bc64de6197979f74675840de6f1248387481abd866e40bdefdd47
-
SSDEEP
6144:QBlL/wyXteRAe8yHzoXERIC20hNTcYa9MpETitvyhbduzQJ2183Ozrjm4Rm3W4nG:iuAteRAe8m2FV0hNTVGMssvyhbdu0g1t
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-