General
-
Target
Pedido - 4500115295.rar
-
Size
679KB
-
Sample
240213-r73rjacb8y
-
MD5
14419ed648bbd9feb66ce6489c054703
-
SHA1
da5f4e8a23fb6f37a806e83726beb16068fa7cf1
-
SHA256
8ea459f4baa4e3504f2553a682787bc6a83d67f12350b1990c6f4b4a67a99d39
-
SHA512
6c30c6fab1e89c0133a82792e92b700561eba56861b3b71d11f7a52ba45db3670742ce64f1af011b94d6c221410a950eb44837aa31b052b8ff95549750d85639
-
SSDEEP
12288:0cK3qLvnDjrBib7C2SWlxdkXEqGG/dHcNrbLzFbBklja5q3cWqcuw3kPWpofyXlk:0fmvDj1ivChW99q7pKeOUMAuw3aHC0HJ
Static task
static1
Behavioral task
behavioral1
Sample
Pedido - 4500115295.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Pedido - 4500115295.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mncomputers.eu - Port:
587 - Username:
[email protected] - Password:
mnmacuni_1 - Email To:
[email protected]
Targets
-
-
Target
Pedido - 4500115295.exe
-
Size
1012KB
-
MD5
6f5fa8d3e58390408dd34fe4a76ea1ab
-
SHA1
84685e91b3238b1ffab5fbb605f0d1b92e2c857a
-
SHA256
03ad7b2694a8e8977e4ef03d884f7119de6a158986678381da5585466a210208
-
SHA512
88866fee8ad0f546afa36aaca3397dc751eb29d4ea7150c854ccef3ff2376d80cdee5f781ce1950d9cd852e85870022567720cd44b3bc997b1e0612e2eb0b440
-
SSDEEP
24576:5P6DEmEEwddHeWt+ZgUYOkYfyadG18fkpXaI:5P2zEEwDHeAwtY1UdG1CaXa
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-