General
-
Target
aff282d10ed4794df3eff097cd3724a4286a38e27ab486b7e7b73c763b6cfc27
-
Size
620KB
-
Sample
240417-pt8dragh2z
-
MD5
405edf1c2eb57897a5e126c9d6e3a0a9
-
SHA1
bfdd417c2a4039c80c538553afd2c63078773a94
-
SHA256
aff282d10ed4794df3eff097cd3724a4286a38e27ab486b7e7b73c763b6cfc27
-
SHA512
4c4d6dc9d163b588ce64ca7f31779c6cfdc251635265407d3fabdf9552320fa914f1bffc086285b34e69e661b38b90fbedcef231f7451e7dcf09e1daa9a90448
-
SSDEEP
12288:+9xXi1LE6sozZRCVQ5xgHAVNiVR1zwbBHJ6Q6KFxGAlpA4N3LBrXnNKnR3G+oF9d:e4vLxgHp9wtP6KFLpA4jrXNWR3cFDT
Static task
static1
Behavioral task
behavioral1
Sample
a3781631c4e416fa9efb09310bca25a02f39f13fe0e33fd715b7be946324b389.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a3781631c4e416fa9efb09310bca25a02f39f13fe0e33fd715b7be946324b389.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
$FW^lzv0 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
$FW^lzv0
Targets
-
-
Target
a3781631c4e416fa9efb09310bca25a02f39f13fe0e33fd715b7be946324b389.exe
-
Size
633KB
-
MD5
1c65c8f56d2190393ddc0109cc37363a
-
SHA1
a6753f38700e4ce6afb21dd505918a4d06dc7e1e
-
SHA256
a3781631c4e416fa9efb09310bca25a02f39f13fe0e33fd715b7be946324b389
-
SHA512
cffc07f47253c86c600a39a45bd62dc8718f30a5625116a07c282eec794c1f41a840fe159ded3b92f08a1c8e0df31366983317ee9c2d0d403f573ef9083f9300
-
SSDEEP
12288:9kvq31eoWORUTcDi748SJdw21PI+OgqLblLV7e7PfX9:9eqFswi8Dd8+ufKr
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-