General
-
Target
0f5b1c3422501727cc27a55d331c8c61f21a67f7aa62abbc660f3dfdb9c5cbf7
-
Size
700KB
-
Sample
231207-dcjtaaaed7
-
MD5
96b53c2dd72911e77e2b7748c766d1df
-
SHA1
28104ba964acdef5d6f1ff01a242a94be183d51e
-
SHA256
0f5b1c3422501727cc27a55d331c8c61f21a67f7aa62abbc660f3dfdb9c5cbf7
-
SHA512
698a8461d408b39b19b6f2548e34012112f0bb0279dcc5de9c071fded82cb61cacbb5369188b590aa5ce17f4926496a17f496afef0b2116b7aea6cad1f8167bb
-
SSDEEP
12288:u0tQaueH5qEm1N75YzqY2y0ZD1zW3MGC8izgdRDh3MvLc2zAgM2:u0LqJNlY2zV1MC8izMDh3MvLPsgM2
Static task
static1
Behavioral task
behavioral1
Sample
0f5b1c3422501727cc27a55d331c8c61f21a67f7aa62abbc660f3dfdb9c5cbf7.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
0f5b1c3422501727cc27a55d331c8c61f21a67f7aa62abbc660f3dfdb9c5cbf7.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cyber.net.pk - Port:
587 - Username:
[email protected] - Password:
Zain2357@ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.cyber.net.pk - Port:
587 - Username:
[email protected] - Password:
Zain2357@
Targets
-
-
Target
0f5b1c3422501727cc27a55d331c8c61f21a67f7aa62abbc660f3dfdb9c5cbf7
-
Size
700KB
-
MD5
96b53c2dd72911e77e2b7748c766d1df
-
SHA1
28104ba964acdef5d6f1ff01a242a94be183d51e
-
SHA256
0f5b1c3422501727cc27a55d331c8c61f21a67f7aa62abbc660f3dfdb9c5cbf7
-
SHA512
698a8461d408b39b19b6f2548e34012112f0bb0279dcc5de9c071fded82cb61cacbb5369188b590aa5ce17f4926496a17f496afef0b2116b7aea6cad1f8167bb
-
SSDEEP
12288:u0tQaueH5qEm1N75YzqY2y0ZD1zW3MGC8izgdRDh3MvLc2zAgM2:u0LqJNlY2zV1MC8izMDh3MvLPsgM2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-