General
-
Target
7a1752872044b490d6af853e3290cddb0187c3b690d1b0ed5bfbeea2dfce7be7
-
Size
1.2MB
-
Sample
240612-bex3ksxclg
-
MD5
d6297a0c00fafd5ee4b94efbf35c9c0a
-
SHA1
e26e9dd98daf21a219ec79fa778c00b3f8a33c02
-
SHA256
7a1752872044b490d6af853e3290cddb0187c3b690d1b0ed5bfbeea2dfce7be7
-
SHA512
283a060e89f24ec7cdc7ada92cb97e40b4724128ad38353659410d97ccfce240f394dff2e37cd01a04b77f0e337fcb6eedf724f0944a9abe062c362c539d2375
-
SSDEEP
24576:uAHnh+eWsN3skA4RV1Hom2KXMmHafKSaIBhnfo+JlUAiH15:Zh+ZkldoPK8YafKS3Bhfo+UAm
Static task
static1
Behavioral task
behavioral1
Sample
7a1752872044b490d6af853e3290cddb0187c3b690d1b0ed5bfbeea2dfce7be7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a1752872044b490d6af853e3290cddb0187c3b690d1b0ed5bfbeea2dfce7be7.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
bezelety.top - Port:
587 - Username:
[email protected] - Password:
IxF(..bSed6k - Email To:
[email protected]
Targets
-
-
Target
7a1752872044b490d6af853e3290cddb0187c3b690d1b0ed5bfbeea2dfce7be7
-
Size
1.2MB
-
MD5
d6297a0c00fafd5ee4b94efbf35c9c0a
-
SHA1
e26e9dd98daf21a219ec79fa778c00b3f8a33c02
-
SHA256
7a1752872044b490d6af853e3290cddb0187c3b690d1b0ed5bfbeea2dfce7be7
-
SHA512
283a060e89f24ec7cdc7ada92cb97e40b4724128ad38353659410d97ccfce240f394dff2e37cd01a04b77f0e337fcb6eedf724f0944a9abe062c362c539d2375
-
SSDEEP
24576:uAHnh+eWsN3skA4RV1Hom2KXMmHafKSaIBhnfo+JlUAiH15:Zh+ZkldoPK8YafKS3Bhfo+UAm
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-