General
-
Target
90e121a29138d8495719ed655ea81ca15069b39d4f824d641b7481065c87c0ed
-
Size
583KB
-
Sample
241219-bhz2cazncz
-
MD5
e82edc936ce96c4466a87b6c4a08dfb7
-
SHA1
f15ecacf4739447dcebb1c9fc8a3c906bf8643b4
-
SHA256
90e121a29138d8495719ed655ea81ca15069b39d4f824d641b7481065c87c0ed
-
SHA512
ece632e0a0307a53d32dce976d035aa6c52fe1d0174c5977921a0bd7a4c7248eeae016e9bb92f60d88fcb061438f97d4245c6b67c75e046e66357db4c040e4ba
-
SSDEEP
12288:w1mIcyAKMR1uktqQV2jIE5/MxcI0KJhmyqTNpyQsgIP6iIw5B2n:w1mfrLpV2jIjZhmyiNs4iIYB2n
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT_57805730260.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
3^?r?mtxk(kt - Email To:
[email protected]
Targets
-
-
Target
SWIFT_57805730260.exe
-
Size
1.1MB
-
MD5
b1f3148c69fa203dc8078cafc2f11196
-
SHA1
acf809e1f99a8f1a3247fc719f5bf035df7a1225
-
SHA256
61add15fcf766dabd73d58c398b2fe60bb98892eac9af9b981f564412023b609
-
SHA512
2d226e129c5943d72aed4d96029af4ecde95be2563a4fbd7f453d3b14a0b88a81d5044c8eba94f66270d0ebde0adad4ee702e6b7773cc8a210e51771f63d6b8a
-
SSDEEP
24576:BqDEvCTbMWu7rQYlBQcBiT6rprG8a+AAeZaKX:BTvC/MTQYxsWR7a+KZa
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-