General
-
Target
209cb080e9ba32c3edc700532d80f1e61d221e02a685401726a56da013ea3fad
-
Size
542KB
-
Sample
231212-b8h6hsebf5
-
MD5
846089595e9fd338a31e8ffad7b89acc
-
SHA1
d220ecde6e8fa41c5b5fc3383ee09b8feba0a9dd
-
SHA256
209cb080e9ba32c3edc700532d80f1e61d221e02a685401726a56da013ea3fad
-
SHA512
0d204eb7b2180c5ca2f371cb22ec568c44261ae2668865c48e781002904d6f7756124b5dcd9a74e324fc1d069bd4637bfee0249f142dd068c4ff5ac520697f9f
-
SSDEEP
12288:53IU8S6eUd+RJTgxDYS1b0lJ0lIkdg1NA0H8Ushjs+etbUe:xItSAd+R5g9pBIkdgsHjs+GI
Static task
static1
Behavioral task
behavioral1
Sample
209cb080e9ba32c3edc700532d80f1e61d221e02a685401726a56da013ea3fad.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
209cb080e9ba32c3edc700532d80f1e61d221e02a685401726a56da013ea3fad.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
7ace90qwerty - Email To:
[email protected]
Targets
-
-
Target
209cb080e9ba32c3edc700532d80f1e61d221e02a685401726a56da013ea3fad
-
Size
542KB
-
MD5
846089595e9fd338a31e8ffad7b89acc
-
SHA1
d220ecde6e8fa41c5b5fc3383ee09b8feba0a9dd
-
SHA256
209cb080e9ba32c3edc700532d80f1e61d221e02a685401726a56da013ea3fad
-
SHA512
0d204eb7b2180c5ca2f371cb22ec568c44261ae2668865c48e781002904d6f7756124b5dcd9a74e324fc1d069bd4637bfee0249f142dd068c4ff5ac520697f9f
-
SSDEEP
12288:53IU8S6eUd+RJTgxDYS1b0lJ0lIkdg1NA0H8Ushjs+etbUe:xItSAd+R5g9pBIkdgsHjs+GI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-