General
-
Target
Equipments Inquiry.exe
-
Size
755KB
-
Sample
240119-mfe4yacff8
-
MD5
debad253d1100432e0332d33556fc789
-
SHA1
4137c486272f4ba84eec5e743ec75586edb2e685
-
SHA256
05369208d0c31e1f2b1cf7bfbeb95439f5b23a08d6ec859a2cf51530a0c74ac1
-
SHA512
fe37d62def5da6c77f5dc58ad77c081d352bacbfe060953172d05883beec5cc2dbf108fb99a7ade4f486a3b0c95da5feabeb886b5980757db40496cb8be9a62d
-
SSDEEP
12288:/UkgToPDD6GOqkKjQ4RxowBw29fChmELWgujzjH8ovIwgT+bLGu9g:/uTobBOqkKc4ROabC+9H8Kxgab/6
Static task
static1
Behavioral task
behavioral1
Sample
Equipments Inquiry.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Equipments Inquiry.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
@BPkIlloCGraceD7@1 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
@BPkIlloCGraceD7@1
Targets
-
-
Target
Equipments Inquiry.exe
-
Size
755KB
-
MD5
debad253d1100432e0332d33556fc789
-
SHA1
4137c486272f4ba84eec5e743ec75586edb2e685
-
SHA256
05369208d0c31e1f2b1cf7bfbeb95439f5b23a08d6ec859a2cf51530a0c74ac1
-
SHA512
fe37d62def5da6c77f5dc58ad77c081d352bacbfe060953172d05883beec5cc2dbf108fb99a7ade4f486a3b0c95da5feabeb886b5980757db40496cb8be9a62d
-
SSDEEP
12288:/UkgToPDD6GOqkKjQ4RxowBw29fChmELWgujzjH8ovIwgT+bLGu9g:/uTobBOqkKc4ROabC+9H8Kxgab/6
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-