General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.27634.23918.exe
-
Size
724KB
-
Sample
221125-f65zqahc7z
-
MD5
909ba64fbed80edf2914e86abbdccec5
-
SHA1
34e2e27b29c780ab71bacd81ff2750264c825c64
-
SHA256
d577eec1fe989d454d7c36b0a29b865c7d433a47518ca35339f86b9f93a52f57
-
SHA512
f8df4ec2c85b7b461e468fea9fb5b0cbb6fb1b3193797dcfe6d31088cbb10dd92b1a36a36699dee9197d40fd95b715be75822c1e7044a61de337eb0d26d4a791
-
SSDEEP
12288:ec2Zr2oTBZYk3xbUssxNQzzi0+25h/dE5IRfQwOUJejSCGmZJbxpDF:12Z5gN0zi0ZE5IRfQwOslCG
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.27634.23918.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.27634.23918.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.akademetre.com - Port:
587 - Username:
[email protected] - Password:
st6473
Targets
-
-
Target
SecuriteInfo.com.Win32.PWSX-gen.27634.23918.exe
-
Size
724KB
-
MD5
909ba64fbed80edf2914e86abbdccec5
-
SHA1
34e2e27b29c780ab71bacd81ff2750264c825c64
-
SHA256
d577eec1fe989d454d7c36b0a29b865c7d433a47518ca35339f86b9f93a52f57
-
SHA512
f8df4ec2c85b7b461e468fea9fb5b0cbb6fb1b3193797dcfe6d31088cbb10dd92b1a36a36699dee9197d40fd95b715be75822c1e7044a61de337eb0d26d4a791
-
SSDEEP
12288:ec2Zr2oTBZYk3xbUssxNQzzi0+25h/dE5IRfQwOUJejSCGmZJbxpDF:12Z5gN0zi0ZE5IRfQwOslCG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-