General
-
Target
7e8466ab7fd0c3ce3f6ef1df5bffa0e4fb0c9764b3c553685ca62e3d8fbb80ad.exe
-
Size
726KB
-
Sample
240507-v722sage7y
-
MD5
4e83799cacdf643392ef05759f5ddbed
-
SHA1
448e53684de7e39aecc362d814e0650c30b51f9e
-
SHA256
7e8466ab7fd0c3ce3f6ef1df5bffa0e4fb0c9764b3c553685ca62e3d8fbb80ad
-
SHA512
700a99493dfba9a99500afc1e9e8a08b1cbe1b3e46c48420d15cb0de254cb72c0a16b015f9800b08a6ee9bfe06a7af96ca318c85f30fdc2d62f16a9de2760fd1
-
SSDEEP
12288:fzuciAEfDNIDR7Qic+SwuF9MQDJZ3febch4ZoeyI2LrSe4kI5B2NIKMcyQBVFFGl:ycRE7yxQic+SLMo38chev2XS1X2NPMKc
Static task
static1
Behavioral task
behavioral1
Sample
7e8466ab7fd0c3ce3f6ef1df5bffa0e4fb0c9764b3c553685ca62e3d8fbb80ad.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7e8466ab7fd0c3ce3f6ef1df5bffa0e4fb0c9764b3c553685ca62e3d8fbb80ad.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.metalsbox.com - Port:
587 - Username:
[email protected] - Password:
zxcA@@258963 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.metalsbox.com - Port:
587 - Username:
[email protected] - Password:
zxcA@@258963
Targets
-
-
Target
7e8466ab7fd0c3ce3f6ef1df5bffa0e4fb0c9764b3c553685ca62e3d8fbb80ad.exe
-
Size
726KB
-
MD5
4e83799cacdf643392ef05759f5ddbed
-
SHA1
448e53684de7e39aecc362d814e0650c30b51f9e
-
SHA256
7e8466ab7fd0c3ce3f6ef1df5bffa0e4fb0c9764b3c553685ca62e3d8fbb80ad
-
SHA512
700a99493dfba9a99500afc1e9e8a08b1cbe1b3e46c48420d15cb0de254cb72c0a16b015f9800b08a6ee9bfe06a7af96ca318c85f30fdc2d62f16a9de2760fd1
-
SSDEEP
12288:fzuciAEfDNIDR7Qic+SwuF9MQDJZ3febch4ZoeyI2LrSe4kI5B2NIKMcyQBVFFGl:ycRE7yxQic+SLMo38chev2XS1X2NPMKc
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-