General
-
Target
a31afb50a1464eb8ecf68411679c2f96.bin
-
Size
673KB
-
Sample
240327-dw8xhsbe92
-
MD5
3cdc79c3294be1074e5bc9e85308ff05
-
SHA1
ed0b6ba4fae1e6f4e1f4ce6a5764d9efc8628f39
-
SHA256
1f3fd47d1fa9c8c3d3ff106e0622c13592d72fa3de8151a913d104dd4f8bf343
-
SHA512
8b669a2d1d30b73959fc6624cb5b4dac70e6319c3fb395d519cfb0c27fdbdd13f356907431ce10d5f03026ff3139a65ed0e9c695aa6b7282b4d5d42f46992c6b
-
SSDEEP
12288:IPMxNSmCu/GnoXkPVIndn+8R80U6eQL5qS3dwiqItGFn9J/mvcjphZH5AQb:IUxN7enoXkPVQ1Rq6lVqSGCAGEjpHHjb
Static task
static1
Behavioral task
behavioral1
Sample
a325a9a1c6a1c0d8df497b180021ae7a5860103f8ed859956679a5a0f608afae.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
a325a9a1c6a1c0d8df497b180021ae7a5860103f8ed859956679a5a0f608afae.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.hashimauditing.com - Port:
587 - Username:
[email protected] - Password:
HwfyE!p}I*GF
Extracted
agenttesla
Protocol: smtp- Host:
mail.hashimauditing.com - Port:
587 - Username:
[email protected] - Password:
HwfyE!p}I*GF - Email To:
[email protected]
Targets
-
-
Target
a325a9a1c6a1c0d8df497b180021ae7a5860103f8ed859956679a5a0f608afae.exe
-
Size
718KB
-
MD5
a31afb50a1464eb8ecf68411679c2f96
-
SHA1
084eedf9d926bdee11413a5a7e2a42ebbd82bd4f
-
SHA256
a325a9a1c6a1c0d8df497b180021ae7a5860103f8ed859956679a5a0f608afae
-
SHA512
86291267d294ed23941ef0933e65b45479a3cc9cf3cd44b58f3fb9d308b07e10c8ef38417c6d96495c4e27606bf6a42f5fd7c63661ff4539d386aec0793022eb
-
SSDEEP
12288:hM4CMwyrGxPJIU8P2vBKYDiWEeW6kYdN5goTwps5JsGD0sKpZMxT+dA:FSNJo+1DcePPqoT3Ds/ZMR
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-