General
-
Target
77b5526259756f5187674aa46ec32d5e5a16f8b4ae0de88ed507af8c448cb0cd
-
Size
645KB
-
Sample
240417-rb3rnacd4x
-
MD5
12eb43af363cd891f8ca4732ca494ffa
-
SHA1
7b18e45e1019b3932401f090471791f6a4b639fa
-
SHA256
77b5526259756f5187674aa46ec32d5e5a16f8b4ae0de88ed507af8c448cb0cd
-
SHA512
e95e09343e6823077aa311891d51e2e0eb46c3009c82cc6daeeb55aebe9b946b8de1db540295aaf792fe1ec948f407108408fe1cec3d02a855c03bd45ed330b8
-
SSDEEP
12288:5xy+pknwUqKlDh7+eiwHFCWNoKMXUjVbnAI5/I9IhQ+MrvhWzNRLgtPRFgg21k:5MPDpDh7JFCWmjExn9A623tWHgtJFw1k
Static task
static1
Behavioral task
behavioral1
Sample
7a20de1b4a4cd2e217be33f3297d2b38d7e7fd69ee216d58f0400160e41ff3ea.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7a20de1b4a4cd2e217be33f3297d2b38d7e7fd69ee216d58f0400160e41ff3ea.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@# - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@#
Targets
-
-
Target
7a20de1b4a4cd2e217be33f3297d2b38d7e7fd69ee216d58f0400160e41ff3ea.exe
-
Size
684KB
-
MD5
df93e537cd7ba3dbc8fefe3e5aff9e0a
-
SHA1
7a04c2ba75e5bacb7052388d0fe32b2ce3e0fc3b
-
SHA256
7a20de1b4a4cd2e217be33f3297d2b38d7e7fd69ee216d58f0400160e41ff3ea
-
SHA512
ef16fae1edae99dbeef552487fbdb22d3f8dba77c38b4ded71206f42db03dc88c62767c82bf56c57c96d3606b7963279b070b5c9ff79c2571343d58bdf8ff53c
-
SSDEEP
12288:0KM9hCaVbvqZsX5HAT1dTrFATopt+O58/4g1E7nKG7eF:6UbZKgThpHS/4UEV7
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-