General
-
Target
648380c95e6e92c66b364357f81403d7
-
Size
807KB
-
Sample
221208-bhm2sabf5t
-
MD5
648380c95e6e92c66b364357f81403d7
-
SHA1
c22c5b9dc3be85ca144aad06979664c7a2a0dbb7
-
SHA256
54162b2492854a0e858585f2a024c3ef7d7d160b91e21d7ec922d4a751ae0c5d
-
SHA512
468637f660636a670c80c530f3220b3fc93643c9978053eabf0d041fa470d4957d99781b26755de7621e90ddc374ef97f6ad8e78dd8a8debeb013841f6c08a0d
-
SSDEEP
12288:Y6Dsz+aDCkVDjJpVBzbLuhd9g48J6Z9Fh/RbRrFrYIxm9jeBWvsmbifcPvT+:YE2VDjJdzPuhd9ao/bJYIYjeIzOfc3C
Static task
static1
Behavioral task
behavioral1
Sample
648380c95e6e92c66b364357f81403d7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
648380c95e6e92c66b364357f81403d7.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.chabiant.az - Port:
587 - Username:
[email protected] - Password:
OOrder123456!!!
Targets
-
-
Target
648380c95e6e92c66b364357f81403d7
-
Size
807KB
-
MD5
648380c95e6e92c66b364357f81403d7
-
SHA1
c22c5b9dc3be85ca144aad06979664c7a2a0dbb7
-
SHA256
54162b2492854a0e858585f2a024c3ef7d7d160b91e21d7ec922d4a751ae0c5d
-
SHA512
468637f660636a670c80c530f3220b3fc93643c9978053eabf0d041fa470d4957d99781b26755de7621e90ddc374ef97f6ad8e78dd8a8debeb013841f6c08a0d
-
SSDEEP
12288:Y6Dsz+aDCkVDjJpVBzbLuhd9g48J6Z9Fh/RbRrFrYIxm9jeBWvsmbifcPvT+:YE2VDjJdzPuhd9ao/bJYIYjeIzOfc3C
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-