General
-
Target
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
-
Size
754KB
-
Sample
231207-x7rbdseg75
-
MD5
0b85d0466bdc1272b82f2168d19fd2f9
-
SHA1
59e5fd69df55b8119f00f339cc291e8021d6c9e8
-
SHA256
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152
-
SHA512
104189a37f741bbc5bca9a84139a2e60eb93aa3416e0246741aea405c44dafa31c4b05e9b9c43bbf2472d071b9f9c905a8dc8765577ef515436c1ffa14a7fd40
-
SSDEEP
12288:RTnueH5qlyMP6sEvkRT8Zbb+rUL3H7ilvK3ZUz6VcwwlNVbxfnj+7IPG:RVqlYlk989Am7EK3ZHVuNr7U
Static task
static1
Behavioral task
behavioral1
Sample
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rolexlogisticsservice.com - Port:
587 - Username:
[email protected] - Password:
Mc;NUa%u+yF. - Email To:
[email protected]
Targets
-
-
Target
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
-
Size
754KB
-
MD5
0b85d0466bdc1272b82f2168d19fd2f9
-
SHA1
59e5fd69df55b8119f00f339cc291e8021d6c9e8
-
SHA256
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152
-
SHA512
104189a37f741bbc5bca9a84139a2e60eb93aa3416e0246741aea405c44dafa31c4b05e9b9c43bbf2472d071b9f9c905a8dc8765577ef515436c1ffa14a7fd40
-
SSDEEP
12288:RTnueH5qlyMP6sEvkRT8Zbb+rUL3H7ilvK3ZUz6VcwwlNVbxfnj+7IPG:RVqlYlk989Am7EK3ZHVuNr7U
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-