General
-
Target
5a14c9bd0f30bc9e8cd979063d7249ab6b4821156eea3c94b2aab6b3316c3cec
-
Size
696KB
-
Sample
240408-bnnkhace36
-
MD5
aee8e4a709f8144bca32ecc48915c4fc
-
SHA1
5c0d5e27b7030b21a079cab84bb3d46b9624f866
-
SHA256
5a14c9bd0f30bc9e8cd979063d7249ab6b4821156eea3c94b2aab6b3316c3cec
-
SHA512
6474e2139c61b719a7f8a9202ab6b76aeafa720c4f2a4b9dd5514251e833f98854bf8ebaa3bb41a40e39a486f8dd5594b78644ce95950adfd100242e9d9fb74e
-
SSDEEP
12288:lsJ8jhCb2exiTveLqFYrTEBOPrZOIj2bdn6v6wK:+J8jUb/JuFypZO7dn6vh
Static task
static1
Behavioral task
behavioral1
Sample
5a14c9bd0f30bc9e8cd979063d7249ab6b4821156eea3c94b2aab6b3316c3cec.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5a14c9bd0f30bc9e8cd979063d7249ab6b4821156eea3c94b2aab6b3316c3cec.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.thanhancompony.com - Port:
587 - Username:
[email protected] - Password:
aSkIhV^3 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.thanhancompony.com - Port:
587 - Username:
[email protected] - Password:
aSkIhV^3
Targets
-
-
Target
5a14c9bd0f30bc9e8cd979063d7249ab6b4821156eea3c94b2aab6b3316c3cec
-
Size
696KB
-
MD5
aee8e4a709f8144bca32ecc48915c4fc
-
SHA1
5c0d5e27b7030b21a079cab84bb3d46b9624f866
-
SHA256
5a14c9bd0f30bc9e8cd979063d7249ab6b4821156eea3c94b2aab6b3316c3cec
-
SHA512
6474e2139c61b719a7f8a9202ab6b76aeafa720c4f2a4b9dd5514251e833f98854bf8ebaa3bb41a40e39a486f8dd5594b78644ce95950adfd100242e9d9fb74e
-
SSDEEP
12288:lsJ8jhCb2exiTveLqFYrTEBOPrZOIj2bdn6v6wK:+J8jUb/JuFypZO7dn6vh
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-