General
-
Target
119d2ba58c8a45c3aad56fd8e59dd589c27fe843288a4aebef14e9e71089aa9f
-
Size
679KB
-
Sample
240329-blyyfseb93
-
MD5
0e22976a7fcdd1b466d0c2d7fea5e5ab
-
SHA1
1b20d47da6f7ece503164053d1db6e5c1179ecd8
-
SHA256
119d2ba58c8a45c3aad56fd8e59dd589c27fe843288a4aebef14e9e71089aa9f
-
SHA512
641e5423b3db90d8e7c426cb2fc40717070d376eef52eb28765b0838b7faef281d23cd4325ca0448ea2f76803659eb4cfd7b5298c4876fd47395f0e92b7e8af7
-
SSDEEP
12288:f00YOwq60rRXEEQPhZktqF2r33+lASUAROR3y9GgnFUDlzu80ywGNzSwrb:gO76WRX0lFeSUzR2lnOZzuHywGNGwrb
Static task
static1
Behavioral task
behavioral1
Sample
119d2ba58c8a45c3aad56fd8e59dd589c27fe843288a4aebef14e9e71089aa9f.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
119d2ba58c8a45c3aad56fd8e59dd589c27fe843288a4aebef14e9e71089aa9f.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.hashimauditing.com - Port:
587 - Username:
[email protected] - Password:
HwfyE!p}I*GF
Extracted
agenttesla
Protocol: smtp- Host:
mail.hashimauditing.com - Port:
587 - Username:
[email protected] - Password:
HwfyE!p}I*GF - Email To:
[email protected]
Targets
-
-
Target
119d2ba58c8a45c3aad56fd8e59dd589c27fe843288a4aebef14e9e71089aa9f
-
Size
679KB
-
MD5
0e22976a7fcdd1b466d0c2d7fea5e5ab
-
SHA1
1b20d47da6f7ece503164053d1db6e5c1179ecd8
-
SHA256
119d2ba58c8a45c3aad56fd8e59dd589c27fe843288a4aebef14e9e71089aa9f
-
SHA512
641e5423b3db90d8e7c426cb2fc40717070d376eef52eb28765b0838b7faef281d23cd4325ca0448ea2f76803659eb4cfd7b5298c4876fd47395f0e92b7e8af7
-
SSDEEP
12288:f00YOwq60rRXEEQPhZktqF2r33+lASUAROR3y9GgnFUDlzu80ywGNzSwrb:gO76WRX0lFeSUzR2lnOZzuHywGNGwrb
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-