General
-
Target
LAM CHUAN.exe
-
Size
573KB
-
Sample
231212-jdsepsadc9
-
MD5
b2d39ecdb67012426b8a8b7389a71aa8
-
SHA1
8905ac8f4674b55fd41cd15fbf9965bad5041f8d
-
SHA256
41430a71d6847e8c25206b5101164baa53b098ca1ee9c8d71a33ceb09e672927
-
SHA512
6e77e4529745999175c4ad760d962264846a9947bb5964842d67b4483c9c4a2f0e6ed5d73b6e5df18a8db75cc103e024a361f7821c9c52968be09799d4e1dfe9
-
SSDEEP
12288:TJ3IU8S6eUdwCY/d/8EqXrfLLzsRqzORl3gQgN0LcvxJ0EwFVvoMYRHA:ThItSAdwCYFe0Ri6lQQgN0SxJnwEMuH
Static task
static1
Behavioral task
behavioral1
Sample
LAM CHUAN.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
LAM CHUAN.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
NX@@OLDdollarDV8FW7 - Email To:
[email protected]
Targets
-
-
Target
LAM CHUAN.exe
-
Size
573KB
-
MD5
b2d39ecdb67012426b8a8b7389a71aa8
-
SHA1
8905ac8f4674b55fd41cd15fbf9965bad5041f8d
-
SHA256
41430a71d6847e8c25206b5101164baa53b098ca1ee9c8d71a33ceb09e672927
-
SHA512
6e77e4529745999175c4ad760d962264846a9947bb5964842d67b4483c9c4a2f0e6ed5d73b6e5df18a8db75cc103e024a361f7821c9c52968be09799d4e1dfe9
-
SSDEEP
12288:TJ3IU8S6eUdwCY/d/8EqXrfLLzsRqzORl3gQgN0LcvxJ0EwFVvoMYRHA:ThItSAdwCYFe0Ri6lQQgN0SxJnwEMuH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-