General
-
Target
36f8f090157d43a028b6cf5c411b3146ef56fa2bf5c3e2eafed956ddd8f79b6b.exe
-
Size
545KB
-
Sample
241122-3f66esyjak
-
MD5
8d2bf4ec1d8067c48af780ba970392fa
-
SHA1
bd54a2e2c937ecbe19050a71f7a2d2f21f0e7231
-
SHA256
36f8f090157d43a028b6cf5c411b3146ef56fa2bf5c3e2eafed956ddd8f79b6b
-
SHA512
d6feb35249b92c733749bd12b89e2e6a727206a54864f759a68894a899bb7d99528ed63de8987dce22f9cc96f6480aba19ac586143643e3e6c9ae537451f53fe
-
SSDEEP
6144:uGxhLQzB1vhV7euL0kzGYF/sTbMfusFnSsk1+E5Hu9i346UooMZS5ZxR6kcsGm3:n+fLiLokToByEOH4CUooMZS5Zx+A3
Static task
static1
Behavioral task
behavioral1
Sample
36f8f090157d43a028b6cf5c411b3146ef56fa2bf5c3e2eafed956ddd8f79b6b.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
Ablegod123456
Targets
-
-
Target
36f8f090157d43a028b6cf5c411b3146ef56fa2bf5c3e2eafed956ddd8f79b6b.exe
-
Size
545KB
-
MD5
8d2bf4ec1d8067c48af780ba970392fa
-
SHA1
bd54a2e2c937ecbe19050a71f7a2d2f21f0e7231
-
SHA256
36f8f090157d43a028b6cf5c411b3146ef56fa2bf5c3e2eafed956ddd8f79b6b
-
SHA512
d6feb35249b92c733749bd12b89e2e6a727206a54864f759a68894a899bb7d99528ed63de8987dce22f9cc96f6480aba19ac586143643e3e6c9ae537451f53fe
-
SSDEEP
6144:uGxhLQzB1vhV7euL0kzGYF/sTbMfusFnSsk1+E5Hu9i346UooMZS5ZxR6kcsGm3:n+fLiLokToByEOH4CUooMZS5Zx+A3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-