General
-
Target
6847ce75c0375d36e337e422751753c4b7ff87fb6d2c00d5ef59911427f89d0d
-
Size
23KB
-
Sample
231212-cr3z2adcep
-
MD5
2fb49f8666cd78b0ccc746c97c2d76d2
-
SHA1
72b378efc36eba9d1b444ce7a2f7bcb9794c2f0e
-
SHA256
6847ce75c0375d36e337e422751753c4b7ff87fb6d2c00d5ef59911427f89d0d
-
SHA512
2109820c70352b000bdf1487947540cc4362a5f531a22d04dee7d7aefddce441dbfb882662ef2059e50a5b5671b3b8bbadbaa9f8df51eba38dbe7168b446eec3
-
SSDEEP
384:s75dqurNFZ3I+F52Bjh7gmkODaglshmJuSxFv5JQzKoX9u:s7Hj5L9Mh7gvhmJPTJQzKy9u
Static task
static1
Behavioral task
behavioral1
Sample
6847ce75c0375d36e337e422751753c4b7ff87fb6d2c00d5ef59911427f89d0d.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
6847ce75c0375d36e337e422751753c4b7ff87fb6d2c00d5ef59911427f89d0d.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.jaazgroup.com - Port:
587 - Username:
[email protected] - Password:
cincin/123
Extracted
agenttesla
Protocol: smtp- Host:
mail.jaazgroup.com - Port:
587 - Username:
[email protected] - Password:
cincin/123 - Email To:
[email protected]
Targets
-
-
Target
6847ce75c0375d36e337e422751753c4b7ff87fb6d2c00d5ef59911427f89d0d
-
Size
23KB
-
MD5
2fb49f8666cd78b0ccc746c97c2d76d2
-
SHA1
72b378efc36eba9d1b444ce7a2f7bcb9794c2f0e
-
SHA256
6847ce75c0375d36e337e422751753c4b7ff87fb6d2c00d5ef59911427f89d0d
-
SHA512
2109820c70352b000bdf1487947540cc4362a5f531a22d04dee7d7aefddce441dbfb882662ef2059e50a5b5671b3b8bbadbaa9f8df51eba38dbe7168b446eec3
-
SSDEEP
384:s75dqurNFZ3I+F52Bjh7gmkODaglshmJuSxFv5JQzKoX9u:s7Hj5L9Mh7gvhmJPTJQzKy9u
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-