General
-
Target
PO.exe
-
Size
1.4MB
-
Sample
250402-pn2c9ayrs9
-
MD5
ab51b833c511b090e286527580db32e8
-
SHA1
48a0b39900158e0f5fbd804603244fd07df28d83
-
SHA256
a017ebe5d908a488c9fe0e16c08d8dece7eeb761eae0f29a873ede41a751bccb
-
SHA512
69d7a5717c83f5ffd55a104e8ce1253a7d724b4bde882b17f47eb100a8f5147eb1142d180e972df509927dffdd2c048e550ec656ed52e5dfd303309b9d2b25b1
-
SSDEEP
24576:+RRHGVP2hQ9ytwN5iaJ8A4WGT9Hq8ziqBmpU4RHakm2IpBT:+RAIMh8ZjRq8Gq0pU41aT2InT
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.azmaplast.com - Port:
587 - Username:
[email protected] - Password:
QAZqaz123@@ - Email To:
[email protected]
Targets
-
-
Target
PO.exe
-
Size
1.4MB
-
MD5
ab51b833c511b090e286527580db32e8
-
SHA1
48a0b39900158e0f5fbd804603244fd07df28d83
-
SHA256
a017ebe5d908a488c9fe0e16c08d8dece7eeb761eae0f29a873ede41a751bccb
-
SHA512
69d7a5717c83f5ffd55a104e8ce1253a7d724b4bde882b17f47eb100a8f5147eb1142d180e972df509927dffdd2c048e550ec656ed52e5dfd303309b9d2b25b1
-
SSDEEP
24576:+RRHGVP2hQ9ytwN5iaJ8A4WGT9Hq8ziqBmpU4RHakm2IpBT:+RAIMh8ZjRq8Gq0pU41aT2InT
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-