General
-
Target
7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe
-
Size
1000KB
-
Sample
240417-qx6vrshh97
-
MD5
b83a6713728f46f6355c75d05bec7211
-
SHA1
a6d9a0f262596cc59b7e5c68743e766045a20fcf
-
SHA256
7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80
-
SHA512
95a141c20f7baf8fccf36c983cb126f80911b0fed89fff88ebafd3f0bf46e7b91bf177399815498b9b7445258a8efe150c6bd7e552070b1a62e6dd122439c1c8
-
SSDEEP
12288:dFY4NBNuZ0XXWm67PCXZIj5MFqyHivmRykwCck0p:U4NeeXYrCXZc4/2p
Static task
static1
Behavioral task
behavioral1
Sample
7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.xpl.co.nz - Port:
587 - Username:
[email protected] - Password:
martin123 - Email To:
[email protected]
Targets
-
-
Target
7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe
-
Size
1000KB
-
MD5
b83a6713728f46f6355c75d05bec7211
-
SHA1
a6d9a0f262596cc59b7e5c68743e766045a20fcf
-
SHA256
7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80
-
SHA512
95a141c20f7baf8fccf36c983cb126f80911b0fed89fff88ebafd3f0bf46e7b91bf177399815498b9b7445258a8efe150c6bd7e552070b1a62e6dd122439c1c8
-
SSDEEP
12288:dFY4NBNuZ0XXWm67PCXZIj5MFqyHivmRykwCck0p:U4NeeXYrCXZc4/2p
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-