General
-
Target
4860fc17275eb07503f1a0def576d46e0be1eb29edb120891be9524b4ea2d986
-
Size
1.1MB
-
Sample
240220-sxz4bsbc32
-
MD5
1004dc1250e41de40bc58d8eae8c0c45
-
SHA1
5bcfb97ed061660ec7a058583952cd142e27bb94
-
SHA256
4860fc17275eb07503f1a0def576d46e0be1eb29edb120891be9524b4ea2d986
-
SHA512
b1789b9c972cdf4bf0a102aaa90f25b017803a97843111b78675baa391bd671a6b9935948ccf493baa7b789d0bc3e2635b9eb90e4f6ff02248348e05d2ebbf70
-
SSDEEP
24576:4qDEvCTbMWu7rQYlBQcBiT6rprG8aQc2bBIdvD59lViL:4TvC/MTQYxsWR7aH2qBD59
Static task
static1
Behavioral task
behavioral1
Sample
4860fc17275eb07503f1a0def576d46e0be1eb29edb120891be9524b4ea2d986.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4860fc17275eb07503f1a0def576d46e0be1eb29edb120891be9524b4ea2d986.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
@qwerty90123 - Email To:
[email protected]
Targets
-
-
Target
4860fc17275eb07503f1a0def576d46e0be1eb29edb120891be9524b4ea2d986
-
Size
1.1MB
-
MD5
1004dc1250e41de40bc58d8eae8c0c45
-
SHA1
5bcfb97ed061660ec7a058583952cd142e27bb94
-
SHA256
4860fc17275eb07503f1a0def576d46e0be1eb29edb120891be9524b4ea2d986
-
SHA512
b1789b9c972cdf4bf0a102aaa90f25b017803a97843111b78675baa391bd671a6b9935948ccf493baa7b789d0bc3e2635b9eb90e4f6ff02248348e05d2ebbf70
-
SSDEEP
24576:4qDEvCTbMWu7rQYlBQcBiT6rprG8aQc2bBIdvD59lViL:4TvC/MTQYxsWR7aH2qBD59
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-