General
-
Target
0a3fa3aecf069fbb8a2c009b1bf7ad6e
-
Size
777KB
-
Sample
231230-bzxmjsecc2
-
MD5
0a3fa3aecf069fbb8a2c009b1bf7ad6e
-
SHA1
99af922c5a6777b57bf5f90b6c9874e56c4a5c80
-
SHA256
445429ca7761e3daa30c866441e49f9d74a90129c4c514e8aad4a6a26fe63f14
-
SHA512
6e0689780c63dd8724dd9673c8c7b1f38978672bf2f2afc674091f9a1e1c284eda2144365c6ebb6e67bfa261acd66199ab9813de4efa23747f6eca34d042e7a7
-
SSDEEP
24576:QHHykC9mIzUewRTCByvgKOYjVcClBynK4:OjVynn
Static task
static1
Behavioral task
behavioral1
Sample
0a3fa3aecf069fbb8a2c009b1bf7ad6e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a3fa3aecf069fbb8a2c009b1bf7ad6e.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.amotoindia.com - Port:
587 - Username:
[email protected] - Password:
aiLFsls9
Targets
-
-
Target
0a3fa3aecf069fbb8a2c009b1bf7ad6e
-
Size
777KB
-
MD5
0a3fa3aecf069fbb8a2c009b1bf7ad6e
-
SHA1
99af922c5a6777b57bf5f90b6c9874e56c4a5c80
-
SHA256
445429ca7761e3daa30c866441e49f9d74a90129c4c514e8aad4a6a26fe63f14
-
SHA512
6e0689780c63dd8724dd9673c8c7b1f38978672bf2f2afc674091f9a1e1c284eda2144365c6ebb6e67bfa261acd66199ab9813de4efa23747f6eca34d042e7a7
-
SSDEEP
24576:QHHykC9mIzUewRTCByvgKOYjVcClBynK4:OjVynn
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-