General
-
Target
dbb893e61d7e03e6248ccbf6f3b62f5073bcdd97da12c3f908bccabcb7f9a1b5
-
Size
613KB
-
Sample
240514-b8ajdaeh66
-
MD5
b17fe781e2cbe7e190f0c2822ba64e57
-
SHA1
37856f81d1c1072f9b231ad153c83c4808ec90d0
-
SHA256
dbb893e61d7e03e6248ccbf6f3b62f5073bcdd97da12c3f908bccabcb7f9a1b5
-
SHA512
ecf89f4b2df8b9d48e4a48798256e9a36551d967f87049120d8fdd2eaa252041254cd83c2301499c36a704509a9386e921cc28dd18f97e0e11b1c816b003db54
-
SSDEEP
12288:sey0J3XR87R6SYOUrcKjLwrg1mDS+Op/EiSJFTK0x:i0T87R6LyYwru+OpGK+
Static task
static1
Behavioral task
behavioral1
Sample
dbb893e61d7e03e6248ccbf6f3b62f5073bcdd97da12c3f908bccabcb7f9a1b5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dbb893e61d7e03e6248ccbf6f3b62f5073bcdd97da12c3f908bccabcb7f9a1b5.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.amacoqatar.net - Port:
587 - Username:
[email protected] - Password:
Abdulaziz@amo100 . ,
Extracted
agenttesla
Protocol: smtp- Host:
mail.amacoqatar.net - Port:
587 - Username:
[email protected] - Password:
Abdulaziz@amo100 . , - Email To:
[email protected]
Targets
-
-
Target
dbb893e61d7e03e6248ccbf6f3b62f5073bcdd97da12c3f908bccabcb7f9a1b5
-
Size
613KB
-
MD5
b17fe781e2cbe7e190f0c2822ba64e57
-
SHA1
37856f81d1c1072f9b231ad153c83c4808ec90d0
-
SHA256
dbb893e61d7e03e6248ccbf6f3b62f5073bcdd97da12c3f908bccabcb7f9a1b5
-
SHA512
ecf89f4b2df8b9d48e4a48798256e9a36551d967f87049120d8fdd2eaa252041254cd83c2301499c36a704509a9386e921cc28dd18f97e0e11b1c816b003db54
-
SSDEEP
12288:sey0J3XR87R6SYOUrcKjLwrg1mDS+Op/EiSJFTK0x:i0T87R6LyYwru+OpGK+
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-