General
-
Target
0ec4ce76de438f905347235226be4078cc5662ab0e0f98f2ce7954e308757735.rar
-
Size
565KB
-
Sample
241214-clep9asqbw
-
MD5
8b03bba78c570723a5846018c377a31f
-
SHA1
b2344ff781a50b20033f6ecf6a420e5300f5915b
-
SHA256
0ec4ce76de438f905347235226be4078cc5662ab0e0f98f2ce7954e308757735
-
SHA512
a64864d0865359381702a63b93a850372553f4535f55d310b2fbe684cc7602cfa270fa9a0a194fb9c0bd2bd3fe803eb7428015f32a96132aeb6d121d2ac6f7c2
-
SSDEEP
12288:ccWmII7JzKUssaMZhg0gvvnohCL4WqBbZrOfdqhSzn40l+bsKduilcDF:ccXrFOUss/QnuCL4WiMdHLl+bXd7cB
Static task
static1
Behavioral task
behavioral1
Sample
TT-copies for invoices.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Anambraeast@2023 - Email To:
[email protected]
Targets
-
-
Target
TT-copies for invoices.exe
-
Size
1.1MB
-
MD5
afe81319c38d7fb0c9061492315fd907
-
SHA1
294e3b75d8fc5bf8afddfa0f7518db11345236c6
-
SHA256
ebb0798162290ffb9a0e46b0ac35c719044bf93c62d90e056fdf9a41c3fc132d
-
SHA512
83a3ac8e7818fc60b506d2d4a1c59b91372d59f5499c7e4a601c13784fdee79ab25ae62162306b32dc125621252611096ea7b17b07998f1517f30f535e3c8c82
-
SSDEEP
24576:lu6J33O0c+JY5UZ+XC0kGso6FaiTmfult3gmWY:nu0c++OCvkGs9FaiTmfOt3gY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-