General
-
Target
8e28f981d8df6a16e7b403b40b43d5bf3c4ad72aa25f774554f3d79ce73d96bd.exe
-
Size
548KB
-
Sample
241121-a9cvfsxkhw
-
MD5
07090828998b6c0e518572a9e86a86e7
-
SHA1
5e3157eb0109488f672ddcc5eba1b6007405c967
-
SHA256
8e28f981d8df6a16e7b403b40b43d5bf3c4ad72aa25f774554f3d79ce73d96bd
-
SHA512
358e07fce6ffaa39bba5c6baf8ee4b0cc39291e3698ad9790a752b5ec0015741b591cdf76623ed17c5e41fd522f8b69d290dc1baf68a7e36601a666604b5d0d6
-
SSDEEP
12288:38yQ4RkOVwJ7v7U2knCWVQdx+i3+70Ky7KTBiOva6:38yhJVwt7Bl+i3+70LUBBT
Static task
static1
Behavioral task
behavioral1
Sample
8e28f981d8df6a16e7b403b40b43d5bf3c4ad72aa25f774554f3d79ce73d96bd.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dairysystems.co.ke - Port:
587 - Username:
[email protected] - Password:
2019@systems
Targets
-
-
Target
8e28f981d8df6a16e7b403b40b43d5bf3c4ad72aa25f774554f3d79ce73d96bd.exe
-
Size
548KB
-
MD5
07090828998b6c0e518572a9e86a86e7
-
SHA1
5e3157eb0109488f672ddcc5eba1b6007405c967
-
SHA256
8e28f981d8df6a16e7b403b40b43d5bf3c4ad72aa25f774554f3d79ce73d96bd
-
SHA512
358e07fce6ffaa39bba5c6baf8ee4b0cc39291e3698ad9790a752b5ec0015741b591cdf76623ed17c5e41fd522f8b69d290dc1baf68a7e36601a666604b5d0d6
-
SSDEEP
12288:38yQ4RkOVwJ7v7U2knCWVQdx+i3+70Ky7KTBiOva6:38yhJVwt7Bl+i3+70LUBBT
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-