General
-
Target
fae36ba66fc14100a4e840b719306f7de7ad8a74b3177a27c7380215271cbeac.exe
-
Size
716KB
-
Sample
240618-x8rcsazalj
-
MD5
9f8d9d5ae02fc17bcdfe02aca5e0305a
-
SHA1
102aa9172143defe9986a4de3b51c1e4e2a3cec6
-
SHA256
fae36ba66fc14100a4e840b719306f7de7ad8a74b3177a27c7380215271cbeac
-
SHA512
030a0c5e3c1bd23e6644f8c6c094ee1c222206d42950330ade21a2889c6dbc81c79fb2c857fb3e2d1b0dc735d61f4d8bf57344008dc06b2d182b3c1e21e6a0e9
-
SSDEEP
12288:zH2iNPyCK2xrOosCZoB+A/0gXBQh9CWdt1Y7+plEAnCBNV1an0WAtzJJ00Q6lRhm:r15yC5spB+AzXHk1YijEiyanR2zJJfBh
Static task
static1
Behavioral task
behavioral1
Sample
fae36ba66fc14100a4e840b719306f7de7ad8a74b3177a27c7380215271cbeac.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fae36ba66fc14100a4e840b719306f7de7ad8a74b3177a27c7380215271cbeac.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sdil.ac.ir - Port:
587 - Username:
[email protected] - Password:
CfoCfo@111581 - Email To:
[email protected]
Targets
-
-
Target
fae36ba66fc14100a4e840b719306f7de7ad8a74b3177a27c7380215271cbeac.exe
-
Size
716KB
-
MD5
9f8d9d5ae02fc17bcdfe02aca5e0305a
-
SHA1
102aa9172143defe9986a4de3b51c1e4e2a3cec6
-
SHA256
fae36ba66fc14100a4e840b719306f7de7ad8a74b3177a27c7380215271cbeac
-
SHA512
030a0c5e3c1bd23e6644f8c6c094ee1c222206d42950330ade21a2889c6dbc81c79fb2c857fb3e2d1b0dc735d61f4d8bf57344008dc06b2d182b3c1e21e6a0e9
-
SSDEEP
12288:zH2iNPyCK2xrOosCZoB+A/0gXBQh9CWdt1Y7+plEAnCBNV1an0WAtzJJ00Q6lRhm:r15yC5spB+AzXHk1YijEiyanR2zJJfBh
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-