General
-
Target
4915f66ed7caab4de6137ad5a73319f0e6bd04303545b57aa0f73bd224acedd9
-
Size
468KB
-
Sample
221125-l8bfsadc8z
-
MD5
4e2720ea5f6c8d2368a9bb97c00a2505
-
SHA1
dc25faf28cee239e9b74d5d3aa933b1bb2d24320
-
SHA256
4915f66ed7caab4de6137ad5a73319f0e6bd04303545b57aa0f73bd224acedd9
-
SHA512
cd258d5b381586211b7bd29b27456d2c25a6ec3d9cdc48c3ebdb178af7ed641098a6ceba29504f7604a798d551c5d1d1b94f6cfe11aaf29c1e6cdabfd5246b30
-
SSDEEP
12288:wKDA5IvbcypAjT90FczMtERDWAA1rqMOaI:yIfpyRsc4tERP0OaI
Static task
static1
Behavioral task
behavioral1
Sample
4915f66ed7caab4de6137ad5a73319f0e6bd04303545b57aa0f73bd224acedd9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4915f66ed7caab4de6137ad5a73319f0e6bd04303545b57aa0f73bd224acedd9.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
pifgweijlylkellk
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
pifgweijlylkellk
Targets
-
-
Target
4915f66ed7caab4de6137ad5a73319f0e6bd04303545b57aa0f73bd224acedd9
-
Size
468KB
-
MD5
4e2720ea5f6c8d2368a9bb97c00a2505
-
SHA1
dc25faf28cee239e9b74d5d3aa933b1bb2d24320
-
SHA256
4915f66ed7caab4de6137ad5a73319f0e6bd04303545b57aa0f73bd224acedd9
-
SHA512
cd258d5b381586211b7bd29b27456d2c25a6ec3d9cdc48c3ebdb178af7ed641098a6ceba29504f7604a798d551c5d1d1b94f6cfe11aaf29c1e6cdabfd5246b30
-
SSDEEP
12288:wKDA5IvbcypAjT90FczMtERDWAA1rqMOaI:yIfpyRsc4tERP0OaI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-