General
-
Target
da642886511d3a2cb648e1c8e4a447405a838a8cf3b0df2f5f5485e2429c6b76
-
Size
1.0MB
-
Sample
240214-by4dpsfa45
-
MD5
c666b7a7d7f8ed740aa7eaf0e77dbd22
-
SHA1
35c55d759c594eeb31357a4d458768bec7e11318
-
SHA256
da642886511d3a2cb648e1c8e4a447405a838a8cf3b0df2f5f5485e2429c6b76
-
SHA512
a66e7c3ba626b5dc987ddffa60e0fbdda7b065584fa0ade4af26ba2f9dfd191b649ffd692ca61342eed3ac08edfbc86ada53a0359c70b837b7160a91337fd3ee
-
SSDEEP
12288:qwpihiLgaQp6wpXdHe1Q1Pr6t/s1yCfAhavUYLAdiHSyN5fKoKt4DprVCb2/Jl:lQhqgEwddHeWt+ZgUYkISyN5fKKv/Jl
Static task
static1
Behavioral task
behavioral1
Sample
da642886511d3a2cb648e1c8e4a447405a838a8cf3b0df2f5f5485e2429c6b76.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
da642886511d3a2cb648e1c8e4a447405a838a8cf3b0df2f5f5485e2429c6b76.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mncomputers.eu - Port:
587 - Username:
[email protected] - Password:
mnmacuni_1 - Email To:
[email protected]
Targets
-
-
Target
da642886511d3a2cb648e1c8e4a447405a838a8cf3b0df2f5f5485e2429c6b76
-
Size
1.0MB
-
MD5
c666b7a7d7f8ed740aa7eaf0e77dbd22
-
SHA1
35c55d759c594eeb31357a4d458768bec7e11318
-
SHA256
da642886511d3a2cb648e1c8e4a447405a838a8cf3b0df2f5f5485e2429c6b76
-
SHA512
a66e7c3ba626b5dc987ddffa60e0fbdda7b065584fa0ade4af26ba2f9dfd191b649ffd692ca61342eed3ac08edfbc86ada53a0359c70b837b7160a91337fd3ee
-
SSDEEP
12288:qwpihiLgaQp6wpXdHe1Q1Pr6t/s1yCfAhavUYLAdiHSyN5fKoKt4DprVCb2/Jl:lQhqgEwddHeWt+ZgUYkISyN5fKKv/Jl
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-