General
-
Target
4860c4829d6149b7b05d263746a1f28702c98d9e187eac27c32f6b2bde162e9b
-
Size
693KB
-
Sample
240124-bt5e7seghj
-
MD5
934e91f70cdcf58395b3ab2bbaebb084
-
SHA1
93b87a059a362c362e286f627a9c4dc429721719
-
SHA256
4860c4829d6149b7b05d263746a1f28702c98d9e187eac27c32f6b2bde162e9b
-
SHA512
ee594223dd62385f858c6450f937906bb0af35f389b83664feb588d233c55d8173c762d2dd4e5a05a782887c1d1c8a35f782a205b8702f27bc3fb93c6feceb64
-
SSDEEP
12288:ouv2iNPBJI3Nin5u2WkXPnDW1u6VBpyurzz7gF2hkQASGqm+pad0hII/7R9zFONN:v1xuN+ucv61u6Vm0zwMTASGq3pM0hVza
Static task
static1
Behavioral task
behavioral1
Sample
4860c4829d6149b7b05d263746a1f28702c98d9e187eac27c32f6b2bde162e9b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4860c4829d6149b7b05d263746a1f28702c98d9e187eac27c32f6b2bde162e9b.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.atasoygumrukleme.com - Port:
587 - Username:
[email protected] - Password:
VThC219! - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.atasoygumrukleme.com - Port:
587 - Username:
[email protected] - Password:
VThC219!
Targets
-
-
Target
4860c4829d6149b7b05d263746a1f28702c98d9e187eac27c32f6b2bde162e9b
-
Size
693KB
-
MD5
934e91f70cdcf58395b3ab2bbaebb084
-
SHA1
93b87a059a362c362e286f627a9c4dc429721719
-
SHA256
4860c4829d6149b7b05d263746a1f28702c98d9e187eac27c32f6b2bde162e9b
-
SHA512
ee594223dd62385f858c6450f937906bb0af35f389b83664feb588d233c55d8173c762d2dd4e5a05a782887c1d1c8a35f782a205b8702f27bc3fb93c6feceb64
-
SSDEEP
12288:ouv2iNPBJI3Nin5u2WkXPnDW1u6VBpyurzz7gF2hkQASGqm+pad0hII/7R9zFONN:v1xuN+ucv61u6Vm0zwMTASGq3pM0hVza
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-