General
-
Target
6dfa9d33ae14092a39047fa26cc6826973dc7779f5f73c94a430a1690b4a1101
-
Size
672KB
-
Sample
250121-fgz26sxmbk
-
MD5
a1ecca252943383f6cef90a6272d719e
-
SHA1
34327568f346f33ccedc859bddbc61d91844a86b
-
SHA256
6dfa9d33ae14092a39047fa26cc6826973dc7779f5f73c94a430a1690b4a1101
-
SHA512
4b20913cef7f086294740ff47b9b493484ee556e7b6cf94540c917dbdb304028b0b4d53add1ef4fde65f04c10005981e881e0d5547b9e44ada9b0ce124c0a6d6
-
SSDEEP
12288:6zztYbSCyFWF0Mye9JWwdy2DDkZP3vrH9U2LtkfERi6B0D4VDFo9sydDrT:+pYUMH5y2nktjdEfERiY0DOBtypT
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9
Targets
-
-
Target
SOA.exe
-
Size
778KB
-
MD5
4b87b32f26b417ddbaaa08391cbf3dfd
-
SHA1
f870a7b9eec7352c7863f2491cabdb404cf53a0d
-
SHA256
3729df5275a3dbba2ea3c90fac7796341a6d2c397ceb0bb5fc98b99a7f76df1d
-
SHA512
5a7e97e4bba2a2cc4b3a3a4a623aa3cb5a252a776a4c9f796b5272d3c1d735bab8fbca2163421d7d3bf1bbe0d37b2a1f864227f2cb545323f9c1fd2339f1a0a7
-
SSDEEP
12288:2KOlbxrEX0IO8Df3PScPgY93W2dyQ1DkJT39bH9usL9wJExi+ByD4RF3mrU:PX/f1PRxyQhkdlduJExi0yDgF3mA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-