General
-
Target
ef05b0557b2c8f0c951a1b21b812e75f.bin
-
Size
611KB
-
Sample
241215-ca6plasmhm
-
MD5
87dec6989aa6876a3d6ce1cc33bffc23
-
SHA1
f19e3dece34ef9931ff1c3f20afde49474010ff2
-
SHA256
58537ae3f9e6c674b4b3997858f5e4d05a2806eef437255ed0f2360a0cadb3ed
-
SHA512
d306af685406e87342fa49f095986c2fce10bf3012ce264c1864d23db4cb32dcd287e64d46fc1e9e3fcedf3ac12ef99ce6029984aa9e49c97af3849e9237f35d
-
SSDEEP
12288:IwJA6A2+mUjLHYg2/4PuBZkZwwq0s6hZjtYDcm5G6Aw7OZ1/:57ARjQ/b0ww33BYDcm5G676Zt
Static task
static1
Behavioral task
behavioral1
Sample
4bec652194b91669f99a72cdc4dbd2dc25138e6dcd64e62248b5f69aa3539471.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
3^?r?mtxk(kt - Email To:
[email protected]
Targets
-
-
Target
4bec652194b91669f99a72cdc4dbd2dc25138e6dcd64e62248b5f69aa3539471.exe
-
Size
1.0MB
-
MD5
ef05b0557b2c8f0c951a1b21b812e75f
-
SHA1
11aae265cc3f60806198436ac9571eee720b908e
-
SHA256
4bec652194b91669f99a72cdc4dbd2dc25138e6dcd64e62248b5f69aa3539471
-
SHA512
a2f6f831f43e277a19b49875c451f757a8b7e93c099260f8d4708b670ab81f690c9ebf68762fdf41c7f46d8f611791554b3175c0d2b7fe94c2eaa686b1060fc3
-
SSDEEP
24576:Tu6J33O0c+JY5UZ+XC0kGso6FaYLum4X1nJ6f7WY:9u0c++OCvkGs9FaYLume1nJ6SY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-