General
-
Target
0638a731032270d02f65d22d25f7ad62088bf6c13c9e20b8e2ed21f6fab4d4a2.exe
-
Size
1.1MB
-
Sample
241009-pglzzsyejc
-
MD5
2313c0cb96f3c0d35dc514de62d1e625
-
SHA1
c36c248a1fef906becb4cd88c8ffa640f3d1ccce
-
SHA256
0638a731032270d02f65d22d25f7ad62088bf6c13c9e20b8e2ed21f6fab4d4a2
-
SHA512
0f7f18174f00249a08c294b064093fa9327076fcd35da8dc2215c050ede8139baea49d105138ecf8d03a1a31d6e931fbfbb938781d4a1c586b472e46a331fb81
-
SSDEEP
24576:LRmJkcoQricOIQxiZY1WNyojmzLLzevg1tN39mWwqxWj6I:IJZoQrbTFZY1WNyJ/n9oWdWj9
Static task
static1
Behavioral task
behavioral1
Sample
0638a731032270d02f65d22d25f7ad62088bf6c13c9e20b8e2ed21f6fab4d4a2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0638a731032270d02f65d22d25f7ad62088bf6c13c9e20b8e2ed21f6fab4d4a2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.naveentour.com - Port:
587 - Username:
[email protected] - Password:
nav!T6u2@001 - Email To:
[email protected]
Targets
-
-
Target
0638a731032270d02f65d22d25f7ad62088bf6c13c9e20b8e2ed21f6fab4d4a2.exe
-
Size
1.1MB
-
MD5
2313c0cb96f3c0d35dc514de62d1e625
-
SHA1
c36c248a1fef906becb4cd88c8ffa640f3d1ccce
-
SHA256
0638a731032270d02f65d22d25f7ad62088bf6c13c9e20b8e2ed21f6fab4d4a2
-
SHA512
0f7f18174f00249a08c294b064093fa9327076fcd35da8dc2215c050ede8139baea49d105138ecf8d03a1a31d6e931fbfbb938781d4a1c586b472e46a331fb81
-
SSDEEP
24576:LRmJkcoQricOIQxiZY1WNyojmzLLzevg1tN39mWwqxWj6I:IJZoQrbTFZY1WNyJ/n9oWdWj9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-