General
-
Target
21754ba57adb2b23107782f004d4072e906f522228601440b00ce8e1e4f6dd54
-
Size
576KB
-
Sample
231226-bkxzrsafg5
-
MD5
ec0826742a7d267fec64ba39577a05d9
-
SHA1
65c12b51d8ade9358c12b21214b0444b6ec0a444
-
SHA256
21754ba57adb2b23107782f004d4072e906f522228601440b00ce8e1e4f6dd54
-
SHA512
575a4f76c98d836a87c180f7e475462953575d5b090574475a08ada1286c814060298e977bb9512cc9c26a4357ed57cf85815871901f0828e93f53d11f7c66bd
-
SSDEEP
6144:wJ3QAyaaOorylFI62OuJiaGBAIwTlcqMCYfJ+Y4Zp9lgh6buG8981dEC:wJgaaOtUVG62VhCz94Muy
Static task
static1
Behavioral task
behavioral1
Sample
21754ba57adb2b23107782f004d4072e906f522228601440b00ce8e1e4f6dd54.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21754ba57adb2b23107782f004d4072e906f522228601440b00ce8e1e4f6dd54.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.1und1.de - Port:
587 - Username:
[email protected] - Password:
MCF3u3Rprel1992%!
Extracted
agenttesla
Protocol: smtp- Host:
smtp.1und1.de - Port:
587 - Username:
[email protected] - Password:
MCF3u3Rprel1992%! - Email To:
[email protected]
Targets
-
-
Target
21754ba57adb2b23107782f004d4072e906f522228601440b00ce8e1e4f6dd54
-
Size
576KB
-
MD5
ec0826742a7d267fec64ba39577a05d9
-
SHA1
65c12b51d8ade9358c12b21214b0444b6ec0a444
-
SHA256
21754ba57adb2b23107782f004d4072e906f522228601440b00ce8e1e4f6dd54
-
SHA512
575a4f76c98d836a87c180f7e475462953575d5b090574475a08ada1286c814060298e977bb9512cc9c26a4357ed57cf85815871901f0828e93f53d11f7c66bd
-
SSDEEP
6144:wJ3QAyaaOorylFI62OuJiaGBAIwTlcqMCYfJ+Y4Zp9lgh6buG8981dEC:wJgaaOtUVG62VhCz94Muy
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-