General
-
Target
27a49e178f3c8ac2429661ef0c79a45679bebe4bed45e5c608642858a82f697e
-
Size
614KB
-
Sample
240417-q1382sab84
-
MD5
d835103b441b90e9c30d042b3cc594c1
-
SHA1
a8d890c74be701bad87aaef994c84f2514b475ca
-
SHA256
27a49e178f3c8ac2429661ef0c79a45679bebe4bed45e5c608642858a82f697e
-
SHA512
68cddd5fc47363980e754b1ae675d127e7be98049c7ca30e9166a9b01fbbbb3fca0790efaa8e8567fc0ac4f67360b4c74cb058654ee4d0b9a34657b9875398cf
-
SSDEEP
12288:osmi++fzYBXYWhVIG7cFkLA9Ez9vbuodHbbmkE9HWRJbO37PkwAix1mhIxE/oPM:oifzYBXYw+G7cCky9uoHbO2G3RAi3yo0
Static task
static1
Behavioral task
behavioral1
Sample
8724a46a073a1f2395ca1d288d9e54364f286e69fba1b1606a17bb87c6bab2b3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8724a46a073a1f2395ca1d288d9e54364f286e69fba1b1606a17bb87c6bab2b3.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
email.globeauto.in - Port:
587 - Username:
[email protected] - Password:
Mohali@@1# - Email To:
[email protected]
Targets
-
-
Target
8724a46a073a1f2395ca1d288d9e54364f286e69fba1b1606a17bb87c6bab2b3.exe
-
Size
654KB
-
MD5
cb8ae5e2795958bde1a3499a035c18c4
-
SHA1
a1cd65d1b22632629da5df5d3c86fa01eddd12e6
-
SHA256
8724a46a073a1f2395ca1d288d9e54364f286e69fba1b1606a17bb87c6bab2b3
-
SHA512
783876272848ca9beac60020cc2e2155384e9dde1eb9c8989744823e211f92a654de8e0d0d8d1bb0ecf7bcc332aeb3745220b4f5ac62520adc77dd11fb0a93f7
-
SSDEEP
12288:/i2KlHqrOPpKqeyLHKV7LtZRrcKZDf5SrzYJ2vp6pynfp:/ElKSPpbzKV7LtZRrpZDf5vJm6up
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-