General
-
Target
34bbf0a5c4ce0bbb9dbc057612abad15bd81f5e180152dd92a258af9de909561
-
Size
1018KB
-
Sample
221125-l3pq8ahd86
-
MD5
f7a1d8cc49f1e7ec9dcd56c43bc76e16
-
SHA1
6cb3cabce65eafe7e03748ef759e1f121b3a17d9
-
SHA256
34bbf0a5c4ce0bbb9dbc057612abad15bd81f5e180152dd92a258af9de909561
-
SHA512
a39260193fc44e190ceda6c351fa193f527a1d15538189253472ed3252a883578556bed23145b061d91f9884ec603d84b6aae955ba0bf2a9192ee7a4ef163d0f
-
SSDEEP
12288:0TCVylF28oxAELPGZnK/YLxwDCwuUpUG6kDIgGGnxCCkWUi96dyXdncy8iFAuXY6:AvlbMGWrhu
Static task
static1
Behavioral task
behavioral1
Sample
34bbf0a5c4ce0bbb9dbc057612abad15bd81f5e180152dd92a258af9de909561.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
34bbf0a5c4ce0bbb9dbc057612abad15bd81f5e180152dd92a258af9de909561.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.prozero-d.com - Port:
587 - Username:
[email protected] - Password:
u*Uv_?kUwgU[
Targets
-
-
Target
34bbf0a5c4ce0bbb9dbc057612abad15bd81f5e180152dd92a258af9de909561
-
Size
1018KB
-
MD5
f7a1d8cc49f1e7ec9dcd56c43bc76e16
-
SHA1
6cb3cabce65eafe7e03748ef759e1f121b3a17d9
-
SHA256
34bbf0a5c4ce0bbb9dbc057612abad15bd81f5e180152dd92a258af9de909561
-
SHA512
a39260193fc44e190ceda6c351fa193f527a1d15538189253472ed3252a883578556bed23145b061d91f9884ec603d84b6aae955ba0bf2a9192ee7a4ef163d0f
-
SSDEEP
12288:0TCVylF28oxAELPGZnK/YLxwDCwuUpUG6kDIgGGnxCCkWUi96dyXdncy8iFAuXY6:AvlbMGWrhu
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-