General
-
Target
c688588a8aa476d6803129466c7e30cc00a6b7de93b2a075b4c05d73e6478908.exe
-
Size
888KB
-
Sample
221019-x67a8adhe6
-
MD5
07abd29ecdca24102aaabd313f102660
-
SHA1
78f0da6151d1c90e3c3c434184c8467402f870b4
-
SHA256
c688588a8aa476d6803129466c7e30cc00a6b7de93b2a075b4c05d73e6478908
-
SHA512
f1472a078ae8c2c29ef06f95080e7850e2d6426b1ab3ed1cfdf075c990621cfa6ccaf314e8ed01d9c2a42f67cbef04f2ac756506be8b9cda4aeaa0edb440f014
-
SSDEEP
12288:6QEQld6gCNRw/du2JoNITNynfcBbEgEE8byKYe3/4R/4ve:hv7PCCdjoNI9Y1YH4ve
Static task
static1
Behavioral task
behavioral1
Sample
c688588a8aa476d6803129466c7e30cc00a6b7de93b2a075b4c05d73e6478908.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c688588a8aa476d6803129466c7e30cc00a6b7de93b2a075b4c05d73e6478908.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.vhs-tr.com - Port:
587 - Username:
[email protected] - Password:
$uugRUt3
Targets
-
-
Target
c688588a8aa476d6803129466c7e30cc00a6b7de93b2a075b4c05d73e6478908.exe
-
Size
888KB
-
MD5
07abd29ecdca24102aaabd313f102660
-
SHA1
78f0da6151d1c90e3c3c434184c8467402f870b4
-
SHA256
c688588a8aa476d6803129466c7e30cc00a6b7de93b2a075b4c05d73e6478908
-
SHA512
f1472a078ae8c2c29ef06f95080e7850e2d6426b1ab3ed1cfdf075c990621cfa6ccaf314e8ed01d9c2a42f67cbef04f2ac756506be8b9cda4aeaa0edb440f014
-
SSDEEP
12288:6QEQld6gCNRw/du2JoNITNynfcBbEgEE8byKYe3/4R/4ve:hv7PCCdjoNI9Y1YH4ve
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-