General
-
Target
Scan2022-11-25_153325_221122_113030.7z
-
Size
545KB
-
Sample
221125-vnfpfabh98
-
MD5
15bf946fd855f2f71365d134c456e9d5
-
SHA1
f77149f6f3324de8e1df198f8c939ea7319c1373
-
SHA256
a3783eac2ed4a3fd7fab2c719984823d28ecbe461f6ff5a507861614a6533443
-
SHA512
2393ece19e40c2937d8f961f8f8bad43a664dd4b631d82125d1c51512e3d3579a3ef59087829134dfa212a13b3d1efacfc340467d0504e039e3f796a1d5c642d
-
SSDEEP
12288:QINhWoTBZsk3xsZCDxy92+gA+T5e//o5IRpqwOmJySPKF1MW:ZPq8yU+gAJo5IRpqwO+hKF1MW
Static task
static1
Behavioral task
behavioral1
Sample
Scan2022-11-25_153325_221122_113030.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Scan2022-11-25_153325_221122_113030.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.akademetre.com - Port:
587 - Username:
[email protected] - Password:
st6473
Targets
-
-
Target
Scan2022-11-25_153325_221122_113030.exe
-
Size
724KB
-
MD5
909ba64fbed80edf2914e86abbdccec5
-
SHA1
34e2e27b29c780ab71bacd81ff2750264c825c64
-
SHA256
d577eec1fe989d454d7c36b0a29b865c7d433a47518ca35339f86b9f93a52f57
-
SHA512
f8df4ec2c85b7b461e468fea9fb5b0cbb6fb1b3193797dcfe6d31088cbb10dd92b1a36a36699dee9197d40fd95b715be75822c1e7044a61de337eb0d26d4a791
-
SSDEEP
12288:ec2Zr2oTBZYk3xbUssxNQzzi0+25h/dE5IRfQwOUJejSCGmZJbxpDF:12Z5gN0zi0ZE5IRfQwOslCG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-