General
-
Target
5ab758621c0b6e66ab18d259b5d352e296644a95d31ee32f99f6c00e5c4f32e6
-
Size
724KB
-
Sample
240430-bktbksfh47
-
MD5
b0c06d0896d3e501fd912f5ddf717e44
-
SHA1
67141af20dd84c9bf704850579e645eefd89f7d9
-
SHA256
5ab758621c0b6e66ab18d259b5d352e296644a95d31ee32f99f6c00e5c4f32e6
-
SHA512
cd1e671a0552efea5e6c0c3eb90211352b87ce56f58b79756788fa9e39dc5dd9cb7447208b9662cdac8e4ea63e0f40e1e53e86b5b2c9186083796485d44566ec
-
SSDEEP
12288:eZGF6KwCufULZpSQMEbTSgqiRFzdXlRdWMI4zr+az1hdIsRyrh39qVxoCA/B778Q:X6udpSQC8TzdXlV+U1hdIWyrhtKC/B
Static task
static1
Behavioral task
behavioral1
Sample
5ab758621c0b6e66ab18d259b5d352e296644a95d31ee32f99f6c00e5c4f32e6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5ab758621c0b6e66ab18d259b5d352e296644a95d31ee32f99f6c00e5c4f32e6.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
=;=yKWThEGx- - Email To:
[email protected]
Targets
-
-
Target
5ab758621c0b6e66ab18d259b5d352e296644a95d31ee32f99f6c00e5c4f32e6
-
Size
724KB
-
MD5
b0c06d0896d3e501fd912f5ddf717e44
-
SHA1
67141af20dd84c9bf704850579e645eefd89f7d9
-
SHA256
5ab758621c0b6e66ab18d259b5d352e296644a95d31ee32f99f6c00e5c4f32e6
-
SHA512
cd1e671a0552efea5e6c0c3eb90211352b87ce56f58b79756788fa9e39dc5dd9cb7447208b9662cdac8e4ea63e0f40e1e53e86b5b2c9186083796485d44566ec
-
SSDEEP
12288:eZGF6KwCufULZpSQMEbTSgqiRFzdXlRdWMI4zr+az1hdIsRyrh39qVxoCA/B778Q:X6udpSQC8TzdXlV+U1hdIWyrhtKC/B
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-