General
-
Target
PO.rar
-
Size
1.2MB
-
Sample
250403-kjyz4swly5
-
MD5
3c068d084ad2a4d4330427aa07c26bed
-
SHA1
3a785fb9102798deb719826ad8f06d924664a911
-
SHA256
4ca6f21ed0317d5f6c8c2c7098a6b445011f650f3ea86d8596664d9d5238c223
-
SHA512
33eeff53cd3674e1963f39dc790ef9a38fbcb0a7c3703aefb53d1881cd7d398357c11116c6a30c8f87d762feae9bdee9f9e2d9bb4bfa0eb6180e8a57012f80c1
-
SSDEEP
24576:kTkoSxkfzz7/SHH3x0kthiKpnibAO8bvS9LFb6VX4cIIb0+DBb2FZIHRkYWOsQNv:kTboeK9DliEO8bvS9hb6VItIQubqZIHb
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.azmaplast.com - Port:
587 - Username:
[email protected] - Password:
QAZqaz123@@ - Email To:
[email protected]
Targets
-
-
Target
PO.exe
-
Size
1.4MB
-
MD5
ab51b833c511b090e286527580db32e8
-
SHA1
48a0b39900158e0f5fbd804603244fd07df28d83
-
SHA256
a017ebe5d908a488c9fe0e16c08d8dece7eeb761eae0f29a873ede41a751bccb
-
SHA512
69d7a5717c83f5ffd55a104e8ce1253a7d724b4bde882b17f47eb100a8f5147eb1142d180e972df509927dffdd2c048e550ec656ed52e5dfd303309b9d2b25b1
-
SSDEEP
24576:+RRHGVP2hQ9ytwN5iaJ8A4WGT9Hq8ziqBmpU4RHakm2IpBT:+RAIMh8ZjRq8Gq0pU41aT2InT
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-