General
-
Target
df95e225feeb2e8547d53ac6760e13c8ce7a9a0858e71df3a4509663285f7cd3
-
Size
931KB
-
Sample
240326-tsneeaea48
-
MD5
36b248e67cb1711b6881f07ee53d7bdf
-
SHA1
0d5e212b5b808ccb81a30f834c61f2378aae8e93
-
SHA256
df95e225feeb2e8547d53ac6760e13c8ce7a9a0858e71df3a4509663285f7cd3
-
SHA512
9fdbdc0b540c491e367045fef4e633d54d2f378504d518ab04a7f5ba0c9db62b01b8046b2cd47fcec2965c18e0e81758c29a5733fa686663455c249a60b58f02
-
SSDEEP
12288:4U6eRXUVUOjuh1xHvWvGttg3IgagVIqkI4YXrjfLEtsVX4aWZrAKV:Kuru+iIKkI5rjRXYV
Static task
static1
Behavioral task
behavioral1
Sample
df95e225feeb2e8547d53ac6760e13c8ce7a9a0858e71df3a4509663285f7cd3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df95e225feeb2e8547d53ac6760e13c8ce7a9a0858e71df3a4509663285f7cd3.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.noor-international.com - Port:
587 - Username:
[email protected] - Password:
Bz@cPoMJ1MPzSJCX3V - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.noor-international.com - Port:
587 - Username:
[email protected] - Password:
Bz@cPoMJ1MPzSJCX3V
Targets
-
-
Target
df95e225feeb2e8547d53ac6760e13c8ce7a9a0858e71df3a4509663285f7cd3
-
Size
931KB
-
MD5
36b248e67cb1711b6881f07ee53d7bdf
-
SHA1
0d5e212b5b808ccb81a30f834c61f2378aae8e93
-
SHA256
df95e225feeb2e8547d53ac6760e13c8ce7a9a0858e71df3a4509663285f7cd3
-
SHA512
9fdbdc0b540c491e367045fef4e633d54d2f378504d518ab04a7f5ba0c9db62b01b8046b2cd47fcec2965c18e0e81758c29a5733fa686663455c249a60b58f02
-
SSDEEP
12288:4U6eRXUVUOjuh1xHvWvGttg3IgagVIqkI4YXrjfLEtsVX4aWZrAKV:Kuru+iIKkI5rjRXYV
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-