General
-
Target
108abb5b19c1a7589b3b476591567547ebb77904c3aed3e0ea715f787250944c
-
Size
620KB
-
Sample
241119-bqkavsyhpn
-
MD5
7ead93987725d8a01849de8f3536ac29
-
SHA1
1a9c4c8b1bc7dde47af80c450829c8098b3787e8
-
SHA256
108abb5b19c1a7589b3b476591567547ebb77904c3aed3e0ea715f787250944c
-
SHA512
5c5115a893d39c6502be6d5eef78c5f18054ee23646d1d8edec6da61addf7ac73cc6a326ebc3abdd1dc69819de3c64d6c4145f01d806319a58d3e659bb45d683
-
SSDEEP
12288:FbIuXnuzOPe4gxPIXmbdBzYro3+BPnX6XVUaEz4vJ7RaFK:FbIuXnO0e1PIXmbP0rouBPnX6WaE8hl
Static task
static1
Behavioral task
behavioral1
Sample
PAGO_57036U790_7097962900_JKLYFDG789.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
vqpF.#;cCodu - Email To:
[email protected]
Targets
-
-
Target
PAGO_57036U790_7097962900_JKLYFDG789.exe
-
Size
1.0MB
-
MD5
5bcb22fd86f5d77d9a210de7aaa1285b
-
SHA1
77860cd889393207878b83b81d4af8dea17e427f
-
SHA256
a459ae41a0e5df32eec7b77a2291dc746ccf2b495a2ce9e0305efbfc021fcd23
-
SHA512
ce0efbed5c7908e1c94a0532e7bb1d4aa0d4303051184595c6e309a5630cd7956cfb6d585b37b5b6fe92407bd6b97283d9e54e912df255182495afd05001e0a2
-
SSDEEP
24576:6tb20pkaCqT5TBWgNQ7a+r7uBP1N6Wag8xAJK6A:nVg5tQ7a++BJCxn5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-