General
-
Target
2292339c7c0a5fbcc46b84c676d901151c1b7fc371fa2c3f4904e538fd2d0092
-
Size
672KB
-
Sample
250121-fg3s3axmbn
-
MD5
5d061f5b1682f7fd084ae54647c08b6f
-
SHA1
cc20010b2da926911d5a36ce3b6cbf850609dbbd
-
SHA256
2292339c7c0a5fbcc46b84c676d901151c1b7fc371fa2c3f4904e538fd2d0092
-
SHA512
80fd0d193ec992b2a4cfa5a61d073d223c343df3143acc86564eb39f1bc587ce27f655d98675fe18266dd59665f59eaa8d4f440c2e37244b60382cd44661af27
-
SSDEEP
12288:IzztYbSCyFWF0Mye9JWwdy2DDkZP3vrH9U2LtkfERi6B0D4VDFo9sydDrF:opYUMH5y2nktjdEfERiY0DOBtypF
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9
Targets
-
-
Target
Invoice.exe
-
Size
778KB
-
MD5
4b87b32f26b417ddbaaa08391cbf3dfd
-
SHA1
f870a7b9eec7352c7863f2491cabdb404cf53a0d
-
SHA256
3729df5275a3dbba2ea3c90fac7796341a6d2c397ceb0bb5fc98b99a7f76df1d
-
SHA512
5a7e97e4bba2a2cc4b3a3a4a623aa3cb5a252a776a4c9f796b5272d3c1d735bab8fbca2163421d7d3bf1bbe0d37b2a1f864227f2cb545323f9c1fd2339f1a0a7
-
SSDEEP
12288:2KOlbxrEX0IO8Df3PScPgY93W2dyQ1DkJT39bH9usL9wJExi+ByD4RF3mrU:PX/f1PRxyQhkdlduJExi0yDgF3mA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-