General
-
Target
f126cda4efceee3f0a3fc83b4e3e4a09afb08013aa27c81d42d1b2cf8f1689c8
-
Size
1.3MB
-
Sample
240509-b5h2cabe6t
-
MD5
81b7f88a2e86706d624b2128746cc8f0
-
SHA1
de6f168a71d72c785d54f7228bc2a1ff37c76bf1
-
SHA256
f126cda4efceee3f0a3fc83b4e3e4a09afb08013aa27c81d42d1b2cf8f1689c8
-
SHA512
f532e0b3ed17eec85cc9adcddb345e9e68bacdfbca1eea428edb4c26e4160ebc82cf731e3674b9854f52b22e4c2e1f6e6363906502b01c96cfd7d6e271777a8b
-
SSDEEP
24576:a4lavt0LkLL9IMixoEgea6vtanuDxuFq9MmCS:tkwkn9IMHea6v4nuteaPCS
Static task
static1
Behavioral task
behavioral1
Sample
f126cda4efceee3f0a3fc83b4e3e4a09afb08013aa27c81d42d1b2cf8f1689c8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f126cda4efceee3f0a3fc83b4e3e4a09afb08013aa27c81d42d1b2cf8f1689c8.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
godwillxzn.com - Port:
587 - Username:
[email protected] - Password:
,~B=)#zzr)o= - Email To:
[email protected]
Targets
-
-
Target
f126cda4efceee3f0a3fc83b4e3e4a09afb08013aa27c81d42d1b2cf8f1689c8
-
Size
1.3MB
-
MD5
81b7f88a2e86706d624b2128746cc8f0
-
SHA1
de6f168a71d72c785d54f7228bc2a1ff37c76bf1
-
SHA256
f126cda4efceee3f0a3fc83b4e3e4a09afb08013aa27c81d42d1b2cf8f1689c8
-
SHA512
f532e0b3ed17eec85cc9adcddb345e9e68bacdfbca1eea428edb4c26e4160ebc82cf731e3674b9854f52b22e4c2e1f6e6363906502b01c96cfd7d6e271777a8b
-
SSDEEP
24576:a4lavt0LkLL9IMixoEgea6vtanuDxuFq9MmCS:tkwkn9IMHea6v4nuteaPCS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-