General
-
Target
98b7a6528d0786ed243d1d9591b0a61e387bc3d4430fd37ae0ad0c8edf55447e.exe
-
Size
738KB
-
Sample
231208-p3bfdaeg6t
-
MD5
ba568e230e681e941ca5a3a2dd9e385f
-
SHA1
bc4c8ae18b8c70483a23e1683f8ba8e19b3547ac
-
SHA256
98b7a6528d0786ed243d1d9591b0a61e387bc3d4430fd37ae0ad0c8edf55447e
-
SHA512
0507c5ee43ed1a7281dfdd4327ba53ba5db58eb01d8d1b1323b4d14a5f7f4e8491163cf90a1f574cf9bdc2b30d88c1cb19d9694b4dbbfdc7de6c2c53728c8cea
-
SSDEEP
12288:K1CFSELXGkJl03hQNZ7cTA4ufYpWj1u11hY48ouauaqaXtEqHZzZ+8yfuAWmGpM:K1CFSQ2k703hHzufrjQVJvHXuOyYAW
Static task
static1
Behavioral task
behavioral1
Sample
98b7a6528d0786ed243d1d9591b0a61e387bc3d4430fd37ae0ad0c8edf55447e.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
98b7a6528d0786ed243d1d9591b0a61e387bc3d4430fd37ae0ad0c8edf55447e.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pharmapanel.com.ar - Port:
587 - Username:
[email protected] - Password:
Pharma23Panel90 - Email To:
[email protected]
Targets
-
-
Target
98b7a6528d0786ed243d1d9591b0a61e387bc3d4430fd37ae0ad0c8edf55447e.exe
-
Size
738KB
-
MD5
ba568e230e681e941ca5a3a2dd9e385f
-
SHA1
bc4c8ae18b8c70483a23e1683f8ba8e19b3547ac
-
SHA256
98b7a6528d0786ed243d1d9591b0a61e387bc3d4430fd37ae0ad0c8edf55447e
-
SHA512
0507c5ee43ed1a7281dfdd4327ba53ba5db58eb01d8d1b1323b4d14a5f7f4e8491163cf90a1f574cf9bdc2b30d88c1cb19d9694b4dbbfdc7de6c2c53728c8cea
-
SSDEEP
12288:K1CFSELXGkJl03hQNZ7cTA4ufYpWj1u11hY48ouauaqaXtEqHZzZ+8yfuAWmGpM:K1CFSQ2k703hHzufrjQVJvHXuOyYAW
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-