General
-
Target
386e671313423c2170db34ae17acf7ab980361d2cc79a42d9879788c7ecf1fba.exe
-
Size
666KB
-
Sample
240508-l17t1shd97
-
MD5
bc2be29df02dc7ef922a9282725a134d
-
SHA1
e9c057113e65aea3e2f82801b63c74ac7aeb7a49
-
SHA256
386e671313423c2170db34ae17acf7ab980361d2cc79a42d9879788c7ecf1fba
-
SHA512
e371c9ede76472d82bf2e797f5028cd3a1cffcfff244e83fd8e6cb923813662480eaea6a3e2bdc988d2b31dd5138a5824b70d42e0327f30a6ce40eb0ddde6b04
-
SSDEEP
12288:gPWnuoWewZXt0tc3c9gOQb2hKvZgHFqpiZdtrT8pkyO+os5uT0mY:50JXtMc37OQb5g71Jfp0m
Static task
static1
Behavioral task
behavioral1
Sample
386e671313423c2170db34ae17acf7ab980361d2cc79a42d9879788c7ecf1fba.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
386e671313423c2170db34ae17acf7ab980361d2cc79a42d9879788c7ecf1fba.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
fzesv)c2 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
fzesv)c2
Targets
-
-
Target
386e671313423c2170db34ae17acf7ab980361d2cc79a42d9879788c7ecf1fba.exe
-
Size
666KB
-
MD5
bc2be29df02dc7ef922a9282725a134d
-
SHA1
e9c057113e65aea3e2f82801b63c74ac7aeb7a49
-
SHA256
386e671313423c2170db34ae17acf7ab980361d2cc79a42d9879788c7ecf1fba
-
SHA512
e371c9ede76472d82bf2e797f5028cd3a1cffcfff244e83fd8e6cb923813662480eaea6a3e2bdc988d2b31dd5138a5824b70d42e0327f30a6ce40eb0ddde6b04
-
SSDEEP
12288:gPWnuoWewZXt0tc3c9gOQb2hKvZgHFqpiZdtrT8pkyO+os5uT0mY:50JXtMc37OQb5g71Jfp0m
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-