General
-
Target
ac3b160870b52f929b70cef1bbd2a1c2532bcb2629049d5adb958fc969df738cN
-
Size
1.1MB
-
Sample
241006-wxp5xaselc
-
MD5
50f0b2aaf6cbcbe1af4d601b47350ee0
-
SHA1
30dc73d7ba6983db388df1308f745f8b0dcc93d2
-
SHA256
ac3b160870b52f929b70cef1bbd2a1c2532bcb2629049d5adb958fc969df738c
-
SHA512
ac12d953575ab31fe5a7eccc87b10ba5d11fcf2fb718d8b3c5e7b15d1171bb3d0fb03bb8b43db83ed1e5d990373c64995e1a9367107e496ca0563fb4609802d4
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1WNQojmzLLzevg1tN39mWwqxWj6I:7JZoQrbTFZY1WNQJ/n9oWdWj9
Static task
static1
Behavioral task
behavioral1
Sample
ac3b160870b52f929b70cef1bbd2a1c2532bcb2629049d5adb958fc969df738cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ac3b160870b52f929b70cef1bbd2a1c2532bcb2629049d5adb958fc969df738cN.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.naveentour.com - Port:
587 - Username:
[email protected] - Password:
nav!T6u2@001 - Email To:
[email protected]
Targets
-
-
Target
ac3b160870b52f929b70cef1bbd2a1c2532bcb2629049d5adb958fc969df738cN
-
Size
1.1MB
-
MD5
50f0b2aaf6cbcbe1af4d601b47350ee0
-
SHA1
30dc73d7ba6983db388df1308f745f8b0dcc93d2
-
SHA256
ac3b160870b52f929b70cef1bbd2a1c2532bcb2629049d5adb958fc969df738c
-
SHA512
ac12d953575ab31fe5a7eccc87b10ba5d11fcf2fb718d8b3c5e7b15d1171bb3d0fb03bb8b43db83ed1e5d990373c64995e1a9367107e496ca0563fb4609802d4
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1WNQojmzLLzevg1tN39mWwqxWj6I:7JZoQrbTFZY1WNQJ/n9oWdWj9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-