General
-
Target
c29ad8b7cf8d2a3bbd93546f4778ec11ff8401a94574806db0479dd79033c55eN
-
Size
1.2MB
-
Sample
241003-w11e2szdnk
-
MD5
17bb63867aba0564b14df72fb99bc3c0
-
SHA1
77119a6734bc592ba19ed83749086c623c559f1f
-
SHA256
c29ad8b7cf8d2a3bbd93546f4778ec11ff8401a94574806db0479dd79033c55e
-
SHA512
e49aab5f57625423877e009f66c5d77959db63a17a03d79f7363195fbc81cd1b5bea20704c17608f52e1e25e61039ad8616ce66e2ed229f71a108634e2a63f9a
-
SSDEEP
24576:rfmMv6Ckr7Mny5QUDNxldjFQBF3WYF4rT+xRnh:r3v+7/5QUDzldjF00YFET+xRh
Static task
static1
Behavioral task
behavioral1
Sample
c29ad8b7cf8d2a3bbd93546f4778ec11ff8401a94574806db0479dd79033c55eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c29ad8b7cf8d2a3bbd93546f4778ec11ff8401a94574806db0479dd79033c55eN.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.agaliofu.top - Port:
587 - Username:
[email protected] - Password:
QPS.6YYl.Yi= - Email To:
[email protected]
Targets
-
-
Target
c29ad8b7cf8d2a3bbd93546f4778ec11ff8401a94574806db0479dd79033c55eN
-
Size
1.2MB
-
MD5
17bb63867aba0564b14df72fb99bc3c0
-
SHA1
77119a6734bc592ba19ed83749086c623c559f1f
-
SHA256
c29ad8b7cf8d2a3bbd93546f4778ec11ff8401a94574806db0479dd79033c55e
-
SHA512
e49aab5f57625423877e009f66c5d77959db63a17a03d79f7363195fbc81cd1b5bea20704c17608f52e1e25e61039ad8616ce66e2ed229f71a108634e2a63f9a
-
SSDEEP
24576:rfmMv6Ckr7Mny5QUDNxldjFQBF3WYF4rT+xRnh:r3v+7/5QUDzldjF00YFET+xRh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-