General
-
Target
67ad621d59d5257cae2a64a6badc5fa3976da6efb35d476ff38ec170b3b49426
-
Size
655KB
-
Sample
240427-byeekshb5y
-
MD5
c15b5c1c2ea96139cbe5abace0c55fd2
-
SHA1
19f92a0d6bad80841930f3a4627abf6189d5f3d1
-
SHA256
67ad621d59d5257cae2a64a6badc5fa3976da6efb35d476ff38ec170b3b49426
-
SHA512
091f5b82f64300d1308b80e799c0d7ef1adb8add6d6d186c23e76d14eedeb77cebcbf4ef0973df1cb67c3f4cf631a40763eb745bf2723c66551a7600dbcbd946
-
SSDEEP
12288:6UF9WM1x49gaotdp8dleVazmT1Y6k56zBmLlO:6U2MbOgBt7Sowc1YfCBGl
Static task
static1
Behavioral task
behavioral1
Sample
67ad621d59d5257cae2a64a6badc5fa3976da6efb35d476ff38ec170b3b49426.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
67ad621d59d5257cae2a64a6badc5fa3976da6efb35d476ff38ec170b3b49426.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.orako.co.ke - Port:
587 - Username:
ebk@orako.co.ke - Password:
S5U^K==*cydR - Email To:
loginebk@orako.co.ke
Targets
-
-
Target
67ad621d59d5257cae2a64a6badc5fa3976da6efb35d476ff38ec170b3b49426
-
Size
655KB
-
MD5
c15b5c1c2ea96139cbe5abace0c55fd2
-
SHA1
19f92a0d6bad80841930f3a4627abf6189d5f3d1
-
SHA256
67ad621d59d5257cae2a64a6badc5fa3976da6efb35d476ff38ec170b3b49426
-
SHA512
091f5b82f64300d1308b80e799c0d7ef1adb8add6d6d186c23e76d14eedeb77cebcbf4ef0973df1cb67c3f4cf631a40763eb745bf2723c66551a7600dbcbd946
-
SSDEEP
12288:6UF9WM1x49gaotdp8dleVazmT1Y6k56zBmLlO:6U2MbOgBt7Sowc1YfCBGl
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-