General
-
Target
dbc8e748f74a83e87df48860a83c06dd1baa5a3d3f93d20d9190c085e70720d6
-
Size
328KB
-
Sample
240308-cx1f4ada44
-
MD5
6dbcc14431508df92ccc76f362a614ee
-
SHA1
4b0530a4a7e1a55ac225a0bf5cc860c97eb02603
-
SHA256
dbc8e748f74a83e87df48860a83c06dd1baa5a3d3f93d20d9190c085e70720d6
-
SHA512
d21dfb92d47ad8c71fbe57dae9048bf07ee95ee09052821e72d0607c82db865267a7246a68af3aeeb1be8583cf133f2ae778a13ee693fb42523e3262b4daa96f
-
SSDEEP
6144:pusWMvUTdSRy5qxvL2Yr2lAVZfAPu2IG0TG+DMwUSyPXqbcAtd7YCLv:UsWMvgOL2dYRJG0ysMEMXGxc
Static task
static1
Behavioral task
behavioral1
Sample
dbc8e748f74a83e87df48860a83c06dd1baa5a3d3f93d20d9190c085e70720d6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dbc8e748f74a83e87df48860a83c06dd1baa5a3d3f93d20d9190c085e70720d6.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.fashiongroup.pl - Port:
587 - Username:
[email protected] - Password:
MAregm20! - Email To:
[email protected]
Targets
-
-
Target
dbc8e748f74a83e87df48860a83c06dd1baa5a3d3f93d20d9190c085e70720d6
-
Size
328KB
-
MD5
6dbcc14431508df92ccc76f362a614ee
-
SHA1
4b0530a4a7e1a55ac225a0bf5cc860c97eb02603
-
SHA256
dbc8e748f74a83e87df48860a83c06dd1baa5a3d3f93d20d9190c085e70720d6
-
SHA512
d21dfb92d47ad8c71fbe57dae9048bf07ee95ee09052821e72d0607c82db865267a7246a68af3aeeb1be8583cf133f2ae778a13ee693fb42523e3262b4daa96f
-
SSDEEP
6144:pusWMvUTdSRy5qxvL2Yr2lAVZfAPu2IG0TG+DMwUSyPXqbcAtd7YCLv:UsWMvgOL2dYRJG0ysMEMXGxc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-