General
-
Target
3180f2b16b371afdd71e3904e27e4bf912c5e140e3638426e3612b8a97f860c3
-
Size
609KB
-
Sample
240522-bwvnsaga74
-
MD5
4947ca504025dc342b661ebc1c01f2db
-
SHA1
e4ab0645c2607e673bf889196d9d42df051227c7
-
SHA256
3180f2b16b371afdd71e3904e27e4bf912c5e140e3638426e3612b8a97f860c3
-
SHA512
9a1ec2da80b7af051b075972d62f68001509fe36a83d744401eb6883bbaae87ae57bfadcf32dff1de060d3c2fcc5656ce772e01a247dfaac3f8100b92f4c4938
-
SSDEEP
12288:YkOEGgAShkNAl2nHrxrnjoou8Z7NJUVjRianXMw57zg/6JdB/LVlcwUZp:YkKZW4xrnUf0ohZMw5AEdBRlcL
Static task
static1
Behavioral task
behavioral1
Sample
3180f2b16b371afdd71e3904e27e4bf912c5e140e3638426e3612b8a97f860c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3180f2b16b371afdd71e3904e27e4bf912c5e140e3638426e3612b8a97f860c3.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.amacoqatar.net - Port:
587 - Username:
[email protected] - Password:
Abdulaziz@amo100 . ,
Extracted
agenttesla
Protocol: smtp- Host:
mail.amacoqatar.net - Port:
587 - Username:
[email protected] - Password:
Abdulaziz@amo100 . , - Email To:
[email protected]
Targets
-
-
Target
3180f2b16b371afdd71e3904e27e4bf912c5e140e3638426e3612b8a97f860c3
-
Size
609KB
-
MD5
4947ca504025dc342b661ebc1c01f2db
-
SHA1
e4ab0645c2607e673bf889196d9d42df051227c7
-
SHA256
3180f2b16b371afdd71e3904e27e4bf912c5e140e3638426e3612b8a97f860c3
-
SHA512
9a1ec2da80b7af051b075972d62f68001509fe36a83d744401eb6883bbaae87ae57bfadcf32dff1de060d3c2fcc5656ce772e01a247dfaac3f8100b92f4c4938
-
SSDEEP
12288:YkOEGgAShkNAl2nHrxrnjoou8Z7NJUVjRianXMw57zg/6JdB/LVlcwUZp:YkKZW4xrnUf0ohZMw5AEdBRlcL
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-