General
-
Target
400_8812838.rar
-
Size
853KB
-
Sample
221103-ybtbjsgebr
-
MD5
2d5f374e6f3b40fc5c58e89a21ef92e9
-
SHA1
567a85430889057a27b4c43719478fc9c9b08eaa
-
SHA256
9dab0724ed5e7cbc44472f1c2e5c08f98c9b8f094b4644520c452ad2a5b79c7f
-
SHA512
7c047e571b87ff45ccc453c5542d493f03b1d46e83595543242774f2df4c747a732ee8577ed531775a47af9f380bfe3d788bbb3c99f037f206855188a102a384
-
SSDEEP
24576:jSZpxjOR8cmVs692NGhwWjO5bPBm9g0Ki8eU41TLnMu:KpJOuW624wD5bEi88eU4xLnr
Static task
static1
Behavioral task
behavioral1
Sample
400_8812838.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
400_8812838.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Logistics@1234
Targets
-
-
Target
400_8812838.exe
-
Size
1.1MB
-
MD5
b04022f9a65ce8062ac786d4acdc4fe4
-
SHA1
b6b3e8f45d85451365c5b9403c2a02396d4a650d
-
SHA256
66aa4ea4ba5c8984d16f01d28456202191ccf94ed14b4ece7ded515524d8c397
-
SHA512
123fb4ced1335cd62f5420358c9eb55c364691959151ec0fee57f3efadac0b1c0d83ae97fff406bb835156835419d57058409154bb066a6efaed71cf4af32f47
-
SSDEEP
12288:/TEleJMQPWrNZs1dxk8iGwhuJvzps7OcUu8wldYomjWMP52J5SNpgjcF75:tJNI8dxkRuJ1s7ou8c7SNpgYFN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-