General
-
Target
c8282eb4403ef499fec1dbc0ae22c928e4f0d9a4f99fcccd1b5734656bbd5632
-
Size
327KB
-
Sample
240115-bh41asedgm
-
MD5
37fcf470a691a94e67b1a74298bc33c1
-
SHA1
87f3856853889a9b0433805c9115fbfcc96dfeda
-
SHA256
c8282eb4403ef499fec1dbc0ae22c928e4f0d9a4f99fcccd1b5734656bbd5632
-
SHA512
c4317aeae59019b248bb9ebe6d331fab4018d429a1ede09e1169e8fe565766d3f6ec7c5d063683d63603bb2f2b6207087dc3c00b6303524b3fb860d953d769fa
-
SSDEEP
6144:MFw3elwGIsLWGUdTLiW/5VaYJWDpVItR90gYfbWjEE+hDxE7dVL/Cvmn92A:Il8pL5/KTdVItRDYftEOD6zz92A
Static task
static1
Behavioral task
behavioral1
Sample
c8282eb4403ef499fec1dbc0ae22c928e4f0d9a4f99fcccd1b5734656bbd5632.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c8282eb4403ef499fec1dbc0ae22c928e4f0d9a4f99fcccd1b5734656bbd5632.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
daolxgyzyjmooghy - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
daolxgyzyjmooghy
Targets
-
-
Target
c8282eb4403ef499fec1dbc0ae22c928e4f0d9a4f99fcccd1b5734656bbd5632
-
Size
327KB
-
MD5
37fcf470a691a94e67b1a74298bc33c1
-
SHA1
87f3856853889a9b0433805c9115fbfcc96dfeda
-
SHA256
c8282eb4403ef499fec1dbc0ae22c928e4f0d9a4f99fcccd1b5734656bbd5632
-
SHA512
c4317aeae59019b248bb9ebe6d331fab4018d429a1ede09e1169e8fe565766d3f6ec7c5d063683d63603bb2f2b6207087dc3c00b6303524b3fb860d953d769fa
-
SSDEEP
6144:MFw3elwGIsLWGUdTLiW/5VaYJWDpVItR90gYfbWjEE+hDxE7dVL/Cvmn92A:Il8pL5/KTdVItRDYftEOD6zz92A
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-