General
-
Target
190469774e832bee578dd5ea4349878063b86eedca8b77f1efec51af20cd1ce7
-
Size
1020KB
-
Sample
240524-jqhe9sad83
-
MD5
9bd9e74ec90979f70c3e6ceead15aa5a
-
SHA1
3e945f971d078852a63db6cbf2698e82700c2f35
-
SHA256
190469774e832bee578dd5ea4349878063b86eedca8b77f1efec51af20cd1ce7
-
SHA512
4362f80e3db045ed6898e225e740f72ec09b4dd8b4752d0323aaac3892d84e2c032eaaca7598f8d04651a44705249a05db9d52299d017a3b8232afc59eb5e928
-
SSDEEP
24576:bAHnh+eWsN3skA4RV1Hom2KXMmHacoB1S4Pg65:2h+ZkldoPK8YacoB1PP9
Static task
static1
Behavioral task
behavioral1
Sample
190469774e832bee578dd5ea4349878063b86eedca8b77f1efec51af20cd1ce7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
190469774e832bee578dd5ea4349878063b86eedca8b77f1efec51af20cd1ce7.exe
Resource
win11-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
vqpF.#;cCodu - Email To:
[email protected]
Targets
-
-
Target
190469774e832bee578dd5ea4349878063b86eedca8b77f1efec51af20cd1ce7
-
Size
1020KB
-
MD5
9bd9e74ec90979f70c3e6ceead15aa5a
-
SHA1
3e945f971d078852a63db6cbf2698e82700c2f35
-
SHA256
190469774e832bee578dd5ea4349878063b86eedca8b77f1efec51af20cd1ce7
-
SHA512
4362f80e3db045ed6898e225e740f72ec09b4dd8b4752d0323aaac3892d84e2c032eaaca7598f8d04651a44705249a05db9d52299d017a3b8232afc59eb5e928
-
SSDEEP
24576:bAHnh+eWsN3skA4RV1Hom2KXMmHacoB1S4Pg65:2h+ZkldoPK8YacoB1PP9
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-