General
-
Target
2e546d749c2e13895babd1d2bca41978605c1ba3967ca0b21709646120704760
-
Size
671KB
-
Sample
240425-bkp9xscg5v
-
MD5
c3783358a70c67db7ba565a68872b2d6
-
SHA1
e0c97fdd090069d6fb47589643fad0d8365b537a
-
SHA256
2e546d749c2e13895babd1d2bca41978605c1ba3967ca0b21709646120704760
-
SHA512
1290fdf7c8ea57681cc62d27d32f6a2b9b386350cdf883d81f931b01cb19c1a9f38487d58d6f96900406e8dbb2cd0fafb0038e9fd2c003b3dce1c3b5ea1ce229
-
SSDEEP
12288:Ztlv312Z3YYmvBh+a/UOqfGFE4xyqJaUpzWDAMk3dWlajbrYbCCZM:ZtJ312ZY1v7PxqfYEkvzlMk3AirYmCZ
Static task
static1
Behavioral task
behavioral1
Sample
2e546d749c2e13895babd1d2bca41978605c1ba3967ca0b21709646120704760.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2e546d749c2e13895babd1d2bca41978605c1ba3967ca0b21709646120704760.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.quoctoan.vn - Port:
587 - Username:
[email protected] - Password:
bGMJNaGYNTLC - Email To:
[email protected]
Targets
-
-
Target
2e546d749c2e13895babd1d2bca41978605c1ba3967ca0b21709646120704760
-
Size
671KB
-
MD5
c3783358a70c67db7ba565a68872b2d6
-
SHA1
e0c97fdd090069d6fb47589643fad0d8365b537a
-
SHA256
2e546d749c2e13895babd1d2bca41978605c1ba3967ca0b21709646120704760
-
SHA512
1290fdf7c8ea57681cc62d27d32f6a2b9b386350cdf883d81f931b01cb19c1a9f38487d58d6f96900406e8dbb2cd0fafb0038e9fd2c003b3dce1c3b5ea1ce229
-
SSDEEP
12288:Ztlv312Z3YYmvBh+a/UOqfGFE4xyqJaUpzWDAMk3dWlajbrYbCCZM:ZtJ312ZY1v7PxqfYEkvzlMk3AirYmCZ
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-