General
-
Target
bd9fba3299a64ff27355869a2967981a931dd71d5a3575053f1c8cf08ff4da2a
-
Size
675KB
-
Sample
241124-bwd12atjaj
-
MD5
f14137fee20d9ab99ce2515b87070ae8
-
SHA1
a26537cad51ae6c05817ac88a1e5d43078bff5f7
-
SHA256
bd9fba3299a64ff27355869a2967981a931dd71d5a3575053f1c8cf08ff4da2a
-
SHA512
2b796633648acf381cfc6e8e8b7403c774f2379eba451712c1a7e39c2b760a8bff7376412e7e26cedaecbde9a01383cc7b0ac39ade680c19ce95f99e882895d9
-
SSDEEP
12288:RZqxsXHfROuQLBiUUNnLsB+RgNCwaiDURQaTxY:iqX/RlQqejNdaiQRQatY
Static task
static1
Behavioral task
behavioral1
Sample
bd9fba3299a64ff27355869a2967981a931dd71d5a3575053f1c8cf08ff4da2a.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.abaamap.com.mx - Port:
587 - Username:
[email protected] - Password:
6.9)bx6}m*k}
Targets
-
-
Target
bd9fba3299a64ff27355869a2967981a931dd71d5a3575053f1c8cf08ff4da2a
-
Size
675KB
-
MD5
f14137fee20d9ab99ce2515b87070ae8
-
SHA1
a26537cad51ae6c05817ac88a1e5d43078bff5f7
-
SHA256
bd9fba3299a64ff27355869a2967981a931dd71d5a3575053f1c8cf08ff4da2a
-
SHA512
2b796633648acf381cfc6e8e8b7403c774f2379eba451712c1a7e39c2b760a8bff7376412e7e26cedaecbde9a01383cc7b0ac39ade680c19ce95f99e882895d9
-
SSDEEP
12288:RZqxsXHfROuQLBiUUNnLsB+RgNCwaiDURQaTxY:iqX/RlQqejNdaiQRQatY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-