General
-
Target
AN 250561137.rar
-
Size
1.2MB
-
Sample
250328-qlf5zaykt2
-
MD5
b859252d9a39a865617e42fb7b2ef61d
-
SHA1
edb53f2c6b109d6910588f53a778dbe0d381afaf
-
SHA256
081b5e4fd64174f093cb6be0758ebe587847d391ab1257815629d9d1c3520dea
-
SHA512
24de991e2fef2b1740ff90a60ad6ff990e167b89e510c3c180c295cf40c65e12957e539a5112f686f2d02f49e6ea7b8229db6f61f344047470a0f035c4da3453
-
SSDEEP
24576:UM0WZh2aJVBSKiLS5JTEz3yHMkwSkRBAwD6qhSpdk+zL0Hn:hrf5BwS7TEDyHjjyAxqhSvF3yn
Static task
static1
Behavioral task
behavioral1
Sample
AN 250561137.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
AN 250561137.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.azmaplast.com - Port:
587 - Username:
[email protected] - Password:
QAZqaz123@@ - Email To:
[email protected]
Targets
-
-
Target
AN 250561137.exe
-
Size
1.4MB
-
MD5
69880aaba9535b0c33ca92856b9997f2
-
SHA1
5a2570e89d5e74a3e55c76895983899e7f303c19
-
SHA256
73f84a24ad71c8218e35c8e832888d45a6595130d6aeae18ccd035f90cc91172
-
SHA512
8b0ce1c7e8effaaf1fdf4ff40cce499e8eb979c1a0bfe3a728767591e0628c66d78bbb6ae1a147693f8f5b172a891bb515e20e8e44147b7f540f56fededa6192
-
SSDEEP
24576:pbuZB9jFRAV8uIvzuZi6hHmQSNMIh+Smf0ZyBy:paT9JRUjYzuE6hHgNNhPmDy
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-