General
-
Target
food.exe
-
Size
1.1MB
-
Sample
241001-gn2p1sxhrc
-
MD5
0fcfeefef9e389286b0ef7e97e1e7f28
-
SHA1
85986dadc140d6d719b844e6f38d775dfad211d5
-
SHA256
c186def00d97aabdf95cf1bbd2605ef8ffc8a05e13fff501b0117ae7395d4487
-
SHA512
e64a173aef6f91d03ba26762ee176b32e50e9344d1cf473dbdd22949c067a0e4b9354f7ecfc742afa6fc53ed67809e1dd7b599f8fbe596dc797d616063e7ed19
-
SSDEEP
24576:JfmMv6Ckr7Mny5QN39deoG/4QnEWxTULNgGL/YG:J3v+7/5QNtdeo/QDUNgGjr
Static task
static1
Behavioral task
behavioral1
Sample
food.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
food.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.solucionesmexico.mx - Port:
587 - Username:
[email protected] - Password:
Qdk,[nKrmI0j - Email To:
[email protected]
Targets
-
-
Target
food.exe
-
Size
1.1MB
-
MD5
0fcfeefef9e389286b0ef7e97e1e7f28
-
SHA1
85986dadc140d6d719b844e6f38d775dfad211d5
-
SHA256
c186def00d97aabdf95cf1bbd2605ef8ffc8a05e13fff501b0117ae7395d4487
-
SHA512
e64a173aef6f91d03ba26762ee176b32e50e9344d1cf473dbdd22949c067a0e4b9354f7ecfc742afa6fc53ed67809e1dd7b599f8fbe596dc797d616063e7ed19
-
SSDEEP
24576:JfmMv6Ckr7Mny5QN39deoG/4QnEWxTULNgGL/YG:J3v+7/5QNtdeo/QDUNgGjr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-