General
-
Target
486f4434c57d01c18df671a8c64a11885fdeec8f1e30baf4e6aafe202239c54a.exe
-
Size
874KB
-
Sample
221207-rs1nmafb69
-
MD5
c59a4011f32ec2c409fcc8aab0464880
-
SHA1
060db6bd2f42dd2360981ae156c0b8870df25b45
-
SHA256
486f4434c57d01c18df671a8c64a11885fdeec8f1e30baf4e6aafe202239c54a
-
SHA512
2e0b5d509187916bf865ecd9934c13b2aef916b62c7b4cb0e42c9f45f477e20655c2e1d9689639fe65d05a83884dd4f579a46bf00aaf720e0daca328a0687fc8
-
SSDEEP
12288:YqliU251kObtMOKd8xJU2AzGjnyCE5fCWnhaX6lFq4lCssk8YfAhfy4x:Yq7o5hMV8k2AzGOtCWnhaCFhg4
Static task
static1
Behavioral task
behavioral1
Sample
486f4434c57d01c18df671a8c64a11885fdeec8f1e30baf4e6aafe202239c54a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
486f4434c57d01c18df671a8c64a11885fdeec8f1e30baf4e6aafe202239c54a.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.nec-eg.com - Port:
587 - Username:
[email protected] - Password:
#i!NeC0O&12
Extracted
agenttesla
Protocol: smtp- Host:
mail.nec-eg.com - Port:
587 - Username:
[email protected] - Password:
#i!NeC0O&12 - Email To:
[email protected]
Targets
-
-
Target
486f4434c57d01c18df671a8c64a11885fdeec8f1e30baf4e6aafe202239c54a.exe
-
Size
874KB
-
MD5
c59a4011f32ec2c409fcc8aab0464880
-
SHA1
060db6bd2f42dd2360981ae156c0b8870df25b45
-
SHA256
486f4434c57d01c18df671a8c64a11885fdeec8f1e30baf4e6aafe202239c54a
-
SHA512
2e0b5d509187916bf865ecd9934c13b2aef916b62c7b4cb0e42c9f45f477e20655c2e1d9689639fe65d05a83884dd4f579a46bf00aaf720e0daca328a0687fc8
-
SSDEEP
12288:YqliU251kObtMOKd8xJU2AzGjnyCE5fCWnhaX6lFq4lCssk8YfAhfy4x:Yq7o5hMV8k2AzGOtCWnhaCFhg4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-