General
-
Target
0CD355D2088C326F4D07BB3202055E30E8F0509BAD28B17A75FFCD3B353F9389
-
Size
1.1MB
-
Sample
250103-jnbjyaxner
-
MD5
a07f8e045ee8dfe5e9a8fae9e5202e33
-
SHA1
c3a1875738130be3f64a15ef4e032135e26ce062
-
SHA256
0cd355d2088c326f4d07bb3202055e30e8f0509bad28b17a75ffcd3b353f9389
-
SHA512
c695735a6256103eb56cb617f739e9ec9e0395cb41110437da587a7e315e012b5a80884a5bf4013705a48dd499dfe36fabb054eb72648ca63178628e466f5534
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaC10XdjI5wpo86U4KZ+rIT6:7JZoQrbTFZY1iaC10NjJhTLMI2
Static task
static1
Behavioral task
behavioral1
Sample
0CD355D2088C326F4D07BB3202055E30E8F0509BAD28B17A75FFCD3B353F9389.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0CD355D2088C326F4D07BB3202055E30E8F0509BAD28B17A75FFCD3B353F9389.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.azmaplast.com - Port:
587 - Username:
[email protected] - Password:
QAZqaz123@@ - Email To:
[email protected]
Targets
-
-
Target
0CD355D2088C326F4D07BB3202055E30E8F0509BAD28B17A75FFCD3B353F9389
-
Size
1.1MB
-
MD5
a07f8e045ee8dfe5e9a8fae9e5202e33
-
SHA1
c3a1875738130be3f64a15ef4e032135e26ce062
-
SHA256
0cd355d2088c326f4d07bb3202055e30e8f0509bad28b17a75ffcd3b353f9389
-
SHA512
c695735a6256103eb56cb617f739e9ec9e0395cb41110437da587a7e315e012b5a80884a5bf4013705a48dd499dfe36fabb054eb72648ca63178628e466f5534
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaC10XdjI5wpo86U4KZ+rIT6:7JZoQrbTFZY1iaC10NjJhTLMI2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-