General
-
Target
6612264b0e2a149cece9e7e541af18e3.bin
-
Size
617KB
-
Sample
240425-b3dzlsda37
-
MD5
ae23c195bb7168925e1f9f0b637c6a5c
-
SHA1
df67cc8018c5c6a734c15ea3aaf370e3c7e22e3c
-
SHA256
e8098f7fd6c011d4a6b6720dfa1578c5e43590018b266c545c195f437d16a4ef
-
SHA512
80c95802c2549ffc4fcee2a1fc7ca8f22e13d500eed8a542f46f10cd1ef5391befdc0aff3404f3100d764f50dc7f7f98ca56ff0f8b5f9a163972d4879e859873
-
SSDEEP
12288:tWk1MIRxzBbzlDF6nnXvkbu4V3yvQt47B2h0r1QONy8:tOIT0ncbpQ1GfOT
Static task
static1
Behavioral task
behavioral1
Sample
205cac67754c6dd6a1c8945b76c800a5019eef9c66d0dde1519ea6c4c1e70976.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
205cac67754c6dd6a1c8945b76c800a5019eef9c66d0dde1519ea6c4c1e70976.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
bezelety.top - Port:
587 - Username:
[email protected] - Password:
IxF(..bSed6k - Email To:
[email protected]
Targets
-
-
Target
205cac67754c6dd6a1c8945b76c800a5019eef9c66d0dde1519ea6c4c1e70976.exe
-
Size
1.1MB
-
MD5
6612264b0e2a149cece9e7e541af18e3
-
SHA1
28d98b61743ba38eb54d8f6a1d4915098eb1775b
-
SHA256
205cac67754c6dd6a1c8945b76c800a5019eef9c66d0dde1519ea6c4c1e70976
-
SHA512
e1deab1bbbc9e008799d1d04ebb8d052926168df42a6913e5da31ca724fde0c0e2bcc19328750907da917626ee3523f2a6f6ec7323b1232d33472ac3648659ee
-
SSDEEP
24576:eAHnh+eWsN3skA4RV1Hom2KXMmHa+iJAv4V+sfz5:Jh+ZkldoPK8Ya+iw4zt
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-