General
-
Target
7f70eec56d05cf2eb2f88b765bb3f01c.bin
-
Size
602KB
-
Sample
240218-ddntmadf35
-
MD5
d74b6f80cda5682d746c2f49b7474119
-
SHA1
1c042ded6214f966d5582686a9e0a214fc071a66
-
SHA256
07222df6edfdfa8af25a3b75027d5280906ea5ad61dd7442a5e06fb5bcc6af02
-
SHA512
6d37f3b894ccf77f8aa54f36fb600a35ae79801fb3d9d819c2ba4c0576d224e5e3f6874123153f4721782ea5e73e3ab1409e1a0d953ad6cf7ff67408e10f5d06
-
SSDEEP
12288:qBK4zYlZ6WzVRJ556GkAjufi96FSf3ZdBej0ZoSyT5ggAoTym3Gkgmc:q7YD6ofJVNufi9ouej0ZsT5g+W7kgmc
Static task
static1
Behavioral task
behavioral1
Sample
755d262d3f1e444bdc34a6a4c536738bdba7e0b321bc6a7771ad059e1ce5d8ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
755d262d3f1e444bdc34a6a4c536738bdba7e0b321bc6a7771ad059e1ce5d8ff.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
rwe87$%21q - Email To:
[email protected]
Targets
-
-
Target
755d262d3f1e444bdc34a6a4c536738bdba7e0b321bc6a7771ad059e1ce5d8ff.exe
-
Size
944KB
-
MD5
7f70eec56d05cf2eb2f88b765bb3f01c
-
SHA1
fab14aeb9a012be522e990881a09047b18262334
-
SHA256
755d262d3f1e444bdc34a6a4c536738bdba7e0b321bc6a7771ad059e1ce5d8ff
-
SHA512
efa5152888a66f3f5f4d9dcb8c56077012f297159aa1542448cdb41cc5d4b996ae6060caa4283753b03d92d814a873249a4678b99ca7a1342b1b7c7b049c4a74
-
SSDEEP
24576:pRmJkcoQricOIQxiZY1ia9PmOytxJ6Kz2yvp2:mJZoQrbTFZY1ia9OL76I2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-