General
-
Target
c4ee955c4be0590482028abf99f4b765c4cd9bcf66b92ff5426d844d09d4d17f.exe
-
Size
814KB
-
Sample
240518-la26vadc32
-
MD5
93ff4144924b59c404d78a9d675b0780
-
SHA1
06b453e503ae91763ebfa34ff27ee80678bdc9d2
-
SHA256
c4ee955c4be0590482028abf99f4b765c4cd9bcf66b92ff5426d844d09d4d17f
-
SHA512
c928fc6c0dea68529662a59624c294a69d8a5eada32b929e2176ecd5d61de05c50ab7e1845e9e30088aa438112a9f105e1a5be7cb0fd08287511a290988865e2
-
SSDEEP
12288:/VT+lpskSKSIwtWdfWfsDxJ254ZewDCLk+jeXFAEhi+MktsdRwuqKV8Ao9lw:V+lpJSNI4WXJPvDPoeXCU8kmETA
Static task
static1
Behavioral task
behavioral1
Sample
c4ee955c4be0590482028abf99f4b765c4cd9bcf66b92ff5426d844d09d4d17f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4ee955c4be0590482028abf99f4b765c4cd9bcf66b92ff5426d844d09d4d17f.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
sk8@@@3145411!!!&*(*&$#@ - Email To:
[email protected]
Targets
-
-
Target
c4ee955c4be0590482028abf99f4b765c4cd9bcf66b92ff5426d844d09d4d17f.exe
-
Size
814KB
-
MD5
93ff4144924b59c404d78a9d675b0780
-
SHA1
06b453e503ae91763ebfa34ff27ee80678bdc9d2
-
SHA256
c4ee955c4be0590482028abf99f4b765c4cd9bcf66b92ff5426d844d09d4d17f
-
SHA512
c928fc6c0dea68529662a59624c294a69d8a5eada32b929e2176ecd5d61de05c50ab7e1845e9e30088aa438112a9f105e1a5be7cb0fd08287511a290988865e2
-
SSDEEP
12288:/VT+lpskSKSIwtWdfWfsDxJ254ZewDCLk+jeXFAEhi+MktsdRwuqKV8Ao9lw:V+lpJSNI4WXJPvDPoeXCU8kmETA
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-