General
-
Target
23af2fb772bd5545965d7027eee074fd
-
Size
442KB
-
Sample
231231-ce9baadaf7
-
MD5
23af2fb772bd5545965d7027eee074fd
-
SHA1
9c251f1b04f9ae720fde9270aa1a16b05d5ebd6a
-
SHA256
36ae717bae1f33b2d8726073f934fce844ca94e9eaa3503fb759d7c4b546ae10
-
SHA512
360e2b814c80e63ca5f64c27e7e39599cc3979da8378084bf6343fdaa17a9fc9cf3470640a9231f6e5a38e793256fefd6a5b43fa23b8196c7874a4e76231a08d
-
SSDEEP
6144:Ehew2rrFYHxwqmPHqWO/6MaWgSLPnJJmw+0mdLNI4BFjjIkE7SClUrQ:girFYRwJPKRR7fm1dC4BxjI1s
Static task
static1
Behavioral task
behavioral1
Sample
23af2fb772bd5545965d7027eee074fd.exe
Resource
win7-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.bafaqroup.com - Port:
587 - Username:
[email protected] - Password:
bs%K^dS2
Targets
-
-
Target
23af2fb772bd5545965d7027eee074fd
-
Size
442KB
-
MD5
23af2fb772bd5545965d7027eee074fd
-
SHA1
9c251f1b04f9ae720fde9270aa1a16b05d5ebd6a
-
SHA256
36ae717bae1f33b2d8726073f934fce844ca94e9eaa3503fb759d7c4b546ae10
-
SHA512
360e2b814c80e63ca5f64c27e7e39599cc3979da8378084bf6343fdaa17a9fc9cf3470640a9231f6e5a38e793256fefd6a5b43fa23b8196c7874a4e76231a08d
-
SSDEEP
6144:Ehew2rrFYHxwqmPHqWO/6MaWgSLPnJJmw+0mdLNI4BFjjIkE7SClUrQ:girFYRwJPKRR7fm1dC4BxjI1s
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-