General
-
Target
d432a1329f11c380758ded311b3a07bdcbe2a845fbceba52f4327fb04ba05975.exe
-
Size
621KB
-
Sample
221208-dts4aabh4v
-
MD5
d9b02cd10f9ccac5fa39057c85967e02
-
SHA1
3081b43204ae6b6afbf726e017f210b8de62cd33
-
SHA256
d432a1329f11c380758ded311b3a07bdcbe2a845fbceba52f4327fb04ba05975
-
SHA512
37d63294ec9fa67e7ef78b8ab02d2b5262a8a42d7648c2f76ff7f90acbf010ec19a840d0ed2b259af38fa160ee6756a5bcf075f9a54726505f1e78c5d4de6d17
-
SSDEEP
12288:8n8Hj/brjphQAt9xA9xD/ou0baJ8hzxJg9TKE0+lq:702U/rsaJ8hzxO0+lq
Static task
static1
Behavioral task
behavioral1
Sample
d432a1329f11c380758ded311b3a07bdcbe2a845fbceba52f4327fb04ba05975.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d432a1329f11c380758ded311b3a07bdcbe2a845fbceba52f4327fb04ba05975.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail2.bpk-spb.ru - Port:
587 - Username:
[email protected] - Password:
75YWEv76M3
Targets
-
-
Target
d432a1329f11c380758ded311b3a07bdcbe2a845fbceba52f4327fb04ba05975.exe
-
Size
621KB
-
MD5
d9b02cd10f9ccac5fa39057c85967e02
-
SHA1
3081b43204ae6b6afbf726e017f210b8de62cd33
-
SHA256
d432a1329f11c380758ded311b3a07bdcbe2a845fbceba52f4327fb04ba05975
-
SHA512
37d63294ec9fa67e7ef78b8ab02d2b5262a8a42d7648c2f76ff7f90acbf010ec19a840d0ed2b259af38fa160ee6756a5bcf075f9a54726505f1e78c5d4de6d17
-
SSDEEP
12288:8n8Hj/brjphQAt9xA9xD/ou0baJ8hzxJg9TKE0+lq:702U/rsaJ8hzxO0+lq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-