General
-
Target
53023c9bc1950e2fa80d70e03c64a2a1d2fd85ee32e7174aa29589f08484b550
-
Size
820KB
-
Sample
240427-cbf6bsgf79
-
MD5
b9419769e75e5f7780483dc97c6e2e33
-
SHA1
469fe9db3fa774c65b5d9e24962cc6404361d270
-
SHA256
53023c9bc1950e2fa80d70e03c64a2a1d2fd85ee32e7174aa29589f08484b550
-
SHA512
e964e1dfb7a7c0a2a09ce858d6f06982a28b6d4d48bf6f825a54f1e105374362e704d2eb598a3978808e7cf646bca1683b03744cf60b189ab39831f0f3b7b2ae
-
SSDEEP
12288:jLbnHHb4pmBwGXjdX32ogZ+g/yHJ8IbxEnZLPSwinr9TGWS:vbHHb4pmB3XZnMZ4O9ZLPx89T9
Static task
static1
Behavioral task
behavioral1
Sample
53023c9bc1950e2fa80d70e03c64a2a1d2fd85ee32e7174aa29589f08484b550.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
53023c9bc1950e2fa80d70e03c64a2a1d2fd85ee32e7174aa29589f08484b550.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
B-60595022bcn - Email To:
[email protected]
Targets
-
-
Target
53023c9bc1950e2fa80d70e03c64a2a1d2fd85ee32e7174aa29589f08484b550
-
Size
820KB
-
MD5
b9419769e75e5f7780483dc97c6e2e33
-
SHA1
469fe9db3fa774c65b5d9e24962cc6404361d270
-
SHA256
53023c9bc1950e2fa80d70e03c64a2a1d2fd85ee32e7174aa29589f08484b550
-
SHA512
e964e1dfb7a7c0a2a09ce858d6f06982a28b6d4d48bf6f825a54f1e105374362e704d2eb598a3978808e7cf646bca1683b03744cf60b189ab39831f0f3b7b2ae
-
SSDEEP
12288:jLbnHHb4pmBwGXjdX32ogZ+g/yHJ8IbxEnZLPSwinr9TGWS:vbHHb4pmB3XZnMZ4O9ZLPx89T9
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-