General
-
Target
dekont.exe
-
Size
487KB
-
Sample
231205-r94rlsbf8s
-
MD5
b1d6c3539b6e19f9a5c95529418ca07e
-
SHA1
dda11c22a7d3282d0cb47661618e7236e5da95f2
-
SHA256
f33f7b39549696d664e95036d69d5e63f825eccfcf483ec984991aba24fca303
-
SHA512
32f384843e3fd67f7b696f1c2a435467e4fd449934dc287e1624e6807a7c2144cee0e0ce989e8db7c97f59075d7daec29c845b0f34537804959c27acc99b7e0f
-
SSDEEP
12288:f6+GATQH1oKmzaUnHlDajSN/M97W3TxtWx0:5pNHlAS1M97W3p
Static task
static1
Behavioral task
behavioral1
Sample
dekont.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
dekont.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sturmsgroup.com - Port:
587 - Username:
[email protected] - Password:
1nxez&C#vfZ6#0Jp - Email To:
[email protected]
Targets
-
-
Target
dekont.exe
-
Size
487KB
-
MD5
b1d6c3539b6e19f9a5c95529418ca07e
-
SHA1
dda11c22a7d3282d0cb47661618e7236e5da95f2
-
SHA256
f33f7b39549696d664e95036d69d5e63f825eccfcf483ec984991aba24fca303
-
SHA512
32f384843e3fd67f7b696f1c2a435467e4fd449934dc287e1624e6807a7c2144cee0e0ce989e8db7c97f59075d7daec29c845b0f34537804959c27acc99b7e0f
-
SSDEEP
12288:f6+GATQH1oKmzaUnHlDajSN/M97W3TxtWx0:5pNHlAS1M97W3p
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-