General
-
Target
71eb61be58692082886805851c29f80b4bb3c3fb718accf820a19c24faa85b1b
-
Size
875KB
-
Sample
250117-bn23wsxmct
-
MD5
f872409ded2e798258dd0e78a30a940b
-
SHA1
05863ef63c86fc687e74a32cbcceed32f91522e3
-
SHA256
71eb61be58692082886805851c29f80b4bb3c3fb718accf820a19c24faa85b1b
-
SHA512
110e3ea092a8eea4f353ab93ff13fa8ffa655671547adca8afd531b7278bee77e111b9a26114bc3df0670398c08960125fe21182cad57a08cb0bb83288dffc78
-
SSDEEP
12288:PhBtmHFWGTyWXV7OUf5oYKmgEacJLpKqnf9yJtQaDVdWCETB9ZLJSrrfCGT:PhBQ1xOa5oYKgJLpLdkbu/qR
Static task
static1
Behavioral task
behavioral1
Sample
71eb61be58692082886805851c29f80b4bb3c3fb718accf820a19c24faa85b1b.exe
Resource
win7-20240729-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9
Targets
-
-
Target
71eb61be58692082886805851c29f80b4bb3c3fb718accf820a19c24faa85b1b
-
Size
875KB
-
MD5
f872409ded2e798258dd0e78a30a940b
-
SHA1
05863ef63c86fc687e74a32cbcceed32f91522e3
-
SHA256
71eb61be58692082886805851c29f80b4bb3c3fb718accf820a19c24faa85b1b
-
SHA512
110e3ea092a8eea4f353ab93ff13fa8ffa655671547adca8afd531b7278bee77e111b9a26114bc3df0670398c08960125fe21182cad57a08cb0bb83288dffc78
-
SSDEEP
12288:PhBtmHFWGTyWXV7OUf5oYKmgEacJLpKqnf9yJtQaDVdWCETB9ZLJSrrfCGT:PhBQ1xOa5oYKgJLpLdkbu/qR
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-