General
-
Target
b5d27a6a080490074912758e91af07064d34d7c7adecd911e232a288f4b5ca93
-
Size
612KB
-
Sample
240425-b2jtgada29
-
MD5
b313af4ef85603c9ada9b6923e3197f6
-
SHA1
05029c9914420426880da3a528f0d0fdb27ca07e
-
SHA256
b5d27a6a080490074912758e91af07064d34d7c7adecd911e232a288f4b5ca93
-
SHA512
52bcfac6455bb598be8f31a9604e4fac31e69e42ec8433504c6592da2307198308ea262e43e7e8b28fa94a0de7cf94bcbc429f56e10a49aebec4eae311a4786e
-
SSDEEP
12288:OnbGicvIQnqVGUwFUqFl5XF8TAOmOTY2FVYClrbaGANgR2ZCy:OaiHd96NP5W0ORY2PYUrbbAeR2Z3
Static task
static1
Behavioral task
behavioral1
Sample
Payment swift copy INV 00932024 .exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Payment swift copy INV 00932024 .exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
bezelety.top - Port:
587 - Username:
[email protected] - Password:
IxF(..bSed6k - Email To:
[email protected]
Targets
-
-
Target
Payment swift copy INV 00932024 .exe
-
Size
1.1MB
-
MD5
de22c7edfc6679da94c02225fcffa3fd
-
SHA1
77075abafc718772960a9863492f6184c7379f43
-
SHA256
466b0fbe2936dcfd9e09ae337bf2d6f77c636ca58150bdaf54d209a290dbeecf
-
SHA512
b200d4a9e7b6bbf177eba6b4426d9e045f23ca92e5733f0e9db736a8d9973f29cd6db99447936c0a7bb4c0dbc1603c62c1728cf975d8be37075ffa5f5c9ccd76
-
SSDEEP
24576:nAHnh+eWsN3skA4RV1Hom2KXMmHadKYqVYGr055:ah+ZkldoPK8YadKYQYuC
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-