General
-
Target
eedc6506254c5d334863559bb0851f5bbbca6e7bed4015614bd840b8f400562f
-
Size
624KB
-
Sample
250122-lq3sba1kcm
-
MD5
478fb8e8a3b881b242caf23ada96051e
-
SHA1
a89beb93dabf2725df1507b155e3ac99f8b81ea4
-
SHA256
eedc6506254c5d334863559bb0851f5bbbca6e7bed4015614bd840b8f400562f
-
SHA512
c2ec7cee6c4d4abb5efa68e5b7c9be80ee05d6dfbce489345b1260696dce76568ef954b7147f5fd5afecccc6cb1f36ba65c32dc2cca4aa7085557ba179ad2368
-
SSDEEP
12288:wZBgLxy3f4pZ9fRzyt4v1+IR7QgsrVGF6kWe+LB8ahyc+0A6jGLanCqSB:wBYM3fUZT+t4vH4OvWeQueyW3YanCqe
Static task
static1
Behavioral task
behavioral1
Sample
ucccccccccccccccccccccccc.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9
Targets
-
-
Target
ucccccccccccccccccccccccc.exe
-
Size
703KB
-
MD5
d5e2b4134debd3c4b82f7655d093ea99
-
SHA1
46c0d741c6e6891328963ece4ec79275eab8f41f
-
SHA256
5d4c512b103d94b3ee9a4840cfe788eebc9c6ff4e5ce5a38aa47385b97d32987
-
SHA512
542fda72e566a657dd92b927327c91286abbe8cd449a37766c19d0544de9d6574b0112a680dde4da49c1491ce812ae7c233169228dbfead0468f7f8ec49b8ffc
-
SSDEEP
12288:KWa+h3UcyNfye27fJZytevZ6IRNQmsRpSF6CWe+LZ84VyIhlMoD:VNUFNfn2NUtevl6qHWeQmKyA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-