General
-
Target
0c96282ef90a91ad838dc1d3581edeb968064bd341c586eb969e4ce2e7712f29
-
Size
624KB
-
Sample
250122-ln62yszncz
-
MD5
3abefd2743392292ec78589e0fbe93e5
-
SHA1
9f4d0de128d700c47ef4e99575ecd2cf3e31c042
-
SHA256
0c96282ef90a91ad838dc1d3581edeb968064bd341c586eb969e4ce2e7712f29
-
SHA512
0683b291d0328ec66a48d4f7565425040621e06ab9e4fb8abfdc340e5feb1cede1e4dc78086d33fcaa883f27b94c48a4ff015af79df1fb98e0045a880ba5770d
-
SSDEEP
12288:VZBgLxy3f4pZ9fRzyt4v1+IR7QgsrVGF6kWe+LB8ahyc+0A6jGLanCqSg:XBYM3fUZT+t4vH4OvWeQueyW3YanCqv
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9
Targets
-
-
Target
INQUIRY.exe
-
Size
703KB
-
MD5
d5e2b4134debd3c4b82f7655d093ea99
-
SHA1
46c0d741c6e6891328963ece4ec79275eab8f41f
-
SHA256
5d4c512b103d94b3ee9a4840cfe788eebc9c6ff4e5ce5a38aa47385b97d32987
-
SHA512
542fda72e566a657dd92b927327c91286abbe8cd449a37766c19d0544de9d6574b0112a680dde4da49c1491ce812ae7c233169228dbfead0468f7f8ec49b8ffc
-
SSDEEP
12288:KWa+h3UcyNfye27fJZytevZ6IRNQmsRpSF6CWe+LZ84VyIhlMoD:VNUFNfn2NUtevl6qHWeQmKyA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-