General
-
Target
8e8034b9c6ed02a4ab3c376ac7613a566157966d47c6c37751e91efe485b87a4
-
Size
473KB
-
Sample
221125-lqny6agf72
-
MD5
65e25b26430cd065f47e0eaeb701c5ae
-
SHA1
5d876b1e37abd2f0fb8d9fb6f05ec7b6d94ba66b
-
SHA256
8e8034b9c6ed02a4ab3c376ac7613a566157966d47c6c37751e91efe485b87a4
-
SHA512
d492cd78a681c1f58427c3c7968736e610aff84262facdfddc274cebcb6424231f682e45fbaa3204144b1af7c0f4d65f6f9e1c0a6b7db752fa73913a20a099c8
-
SSDEEP
12288:Ifw7oJOgjW0B0flg9HC/R5Vy5PIU4M+iobgrvCiSLlRO28:Ifwj/R5Vy5JF+2GtJRc
Static task
static1
Behavioral task
behavioral1
Sample
8e8034b9c6ed02a4ab3c376ac7613a566157966d47c6c37751e91efe485b87a4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8e8034b9c6ed02a4ab3c376ac7613a566157966d47c6c37751e91efe485b87a4.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
enugu222
Targets
-
-
Target
8e8034b9c6ed02a4ab3c376ac7613a566157966d47c6c37751e91efe485b87a4
-
Size
473KB
-
MD5
65e25b26430cd065f47e0eaeb701c5ae
-
SHA1
5d876b1e37abd2f0fb8d9fb6f05ec7b6d94ba66b
-
SHA256
8e8034b9c6ed02a4ab3c376ac7613a566157966d47c6c37751e91efe485b87a4
-
SHA512
d492cd78a681c1f58427c3c7968736e610aff84262facdfddc274cebcb6424231f682e45fbaa3204144b1af7c0f4d65f6f9e1c0a6b7db752fa73913a20a099c8
-
SSDEEP
12288:Ifw7oJOgjW0B0flg9HC/R5Vy5PIU4M+iobgrvCiSLlRO28:Ifwj/R5Vy5JF+2GtJRc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-