General
-
Target
89c3fdbfb235dc542ea71bc49bd8ab13403a0be6400a3865530f6e2900a536f5
-
Size
718KB
-
Sample
250117-bn3z7axmcv
-
MD5
f8fde9e8b19a896baf13f29e83ab96e4
-
SHA1
953c2d49d5483bb0f061691ff6854db753e0d4ff
-
SHA256
89c3fdbfb235dc542ea71bc49bd8ab13403a0be6400a3865530f6e2900a536f5
-
SHA512
15a3b9e8f6df96857878ecbff4203847079004cd93b4f0aec5c85b691c518b1769722a2ce9a589b0bbe1fc537462f72af0a2b7829e3eeb1a7caf89aba7c1b285
-
SSDEEP
12288:wYzM0EoBMjwjogzxiycRa4iVnDRgvYgcck5TuQ0GCI8LU9I/hQ9iuA7IWiciyPA:/ECMUjNzx9csZntgwX9eU9MsCjiTyPA
Static task
static1
Behavioral task
behavioral1
Sample
sales Contract 81280903648.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9
Targets
-
-
Target
sales Contract 81280903648.exe
-
Size
875KB
-
MD5
f872409ded2e798258dd0e78a30a940b
-
SHA1
05863ef63c86fc687e74a32cbcceed32f91522e3
-
SHA256
71eb61be58692082886805851c29f80b4bb3c3fb718accf820a19c24faa85b1b
-
SHA512
110e3ea092a8eea4f353ab93ff13fa8ffa655671547adca8afd531b7278bee77e111b9a26114bc3df0670398c08960125fe21182cad57a08cb0bb83288dffc78
-
SSDEEP
12288:PhBtmHFWGTyWXV7OUf5oYKmgEacJLpKqnf9yJtQaDVdWCETB9ZLJSrrfCGT:PhBQ1xOa5oYKgJLpLdkbu/qR
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-