General
-
Target
0514b13e04aebfc772fe6bf20c22f7bed964b4dddf5d9ddd3eabe791a8adf72c
-
Size
635KB
-
Sample
240417-pjyrkaee83
-
MD5
598abf8c1dc280af3f29065ea81a1d9b
-
SHA1
294d97ea10f5b1e347c5be0dd4aab945f5509506
-
SHA256
0514b13e04aebfc772fe6bf20c22f7bed964b4dddf5d9ddd3eabe791a8adf72c
-
SHA512
e366555932290f2d5c243933c130bb2e73fe904f95f9ed152c112a7e4e513dcfa30690294b187eae53b3fbda190c773aad5a4874f4613365678f25927366f379
-
SSDEEP
12288:DjJiDjNA2yqE/nj3ftiZ444ABOjwPTTL5YEaRQ++DnCJ36XKHEo0AL5gPdKvc:DdghyqEvjPkyWBOjmTHSpRQK2tw5KKU
Static task
static1
Behavioral task
behavioral1
Sample
af83c0d8ccb38c430dce3b0c4a18eeda3c91832ae8bb432a9614619fd5727e7b.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
af83c0d8ccb38c430dce3b0c4a18eeda3c91832ae8bb432a9614619fd5727e7b.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
K@fYQ*o1 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
K@fYQ*o1
Targets
-
-
Target
af83c0d8ccb38c430dce3b0c4a18eeda3c91832ae8bb432a9614619fd5727e7b.exe
-
Size
667KB
-
MD5
10f4c53cf6490bcf1f1cf0f3a88250de
-
SHA1
4e9d7fd3c9651c205f72a6c696c656e7ae84a9d8
-
SHA256
af83c0d8ccb38c430dce3b0c4a18eeda3c91832ae8bb432a9614619fd5727e7b
-
SHA512
24b71b5339000c364858c137a7955cd7b464466da658ccb44c3659bedc55dcab89c185ceeb2bc5debd42d0e34ffd01f0f81d761c6a22e11dbc70bdd7786f30d5
-
SSDEEP
12288:JBLK1sKjd9+wrOGCZ8SBvAxi/MgUd7YN0hMJqGcIlHI16CDYWEVy4Zw13vHruup:JBisKjdTOGu8SVIsmqaM7lHw6COtw1fr
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-