General
-
Target
e-dekont_html.exe
-
Size
618KB
-
Sample
231212-jm4t4aafa8
-
MD5
f2bb7933144ee3a467f3def2d259af22
-
SHA1
fa6c6b2fd1b5df8d4bcd35066636ba9032faf46d
-
SHA256
a89ba38f7ceffe3e59803a0208dee82349f86c7d72aaec093f8ca310c5d20c9b
-
SHA512
edd7e5285b948446b225fe60f2e38f104c5388c579565b68861c1369611b1125d9914c3285238bb13a91285fe29bdb3e659c26ce018c11aaeb50e9e0e5507e07
-
SSDEEP
12288:23IU8S6eUdNZMFkFueo3lRVyZQYYS0U4d9Eu0b0jAvCN:MItSAdXQkeVyZDYS0U4d9Exb08vG
Static task
static1
Behavioral task
behavioral1
Sample
e-dekont_html.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
e-dekont_html.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.interloggumruk.com - Port:
587 - Username:
[email protected] - Password:
interlog.2022 - Email To:
[email protected]
Targets
-
-
Target
e-dekont_html.exe
-
Size
618KB
-
MD5
f2bb7933144ee3a467f3def2d259af22
-
SHA1
fa6c6b2fd1b5df8d4bcd35066636ba9032faf46d
-
SHA256
a89ba38f7ceffe3e59803a0208dee82349f86c7d72aaec093f8ca310c5d20c9b
-
SHA512
edd7e5285b948446b225fe60f2e38f104c5388c579565b68861c1369611b1125d9914c3285238bb13a91285fe29bdb3e659c26ce018c11aaeb50e9e0e5507e07
-
SSDEEP
12288:23IU8S6eUdNZMFkFueo3lRVyZQYYS0U4d9Eu0b0jAvCN:MItSAdXQkeVyZDYS0U4d9Exb08vG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-