General
-
Target
0f54c107cf3daad4695390e86d3aa2d8769003cb254ca985022182a7ba0c44c4.exe
-
Size
731KB
-
Sample
221208-p1slwaaa52
-
MD5
2b429a6f4dfe55f1224864d891fa1f3b
-
SHA1
275ff177de1de88c4a7803b01a9ea4ede8e96f8f
-
SHA256
0f54c107cf3daad4695390e86d3aa2d8769003cb254ca985022182a7ba0c44c4
-
SHA512
0378ae45cbf5811624e317e77b6d46fbbafafb7b49a15b3f87eb5040628ca732a343f52dcafcf6a23d9fd2f55d93f2cd02c3de15233556f4605761152fbfb45a
-
SSDEEP
12288:/1gh/PsZ1DX/VDJjXSRBofGXhX1MinvOitpm+DOX4MHEEvQ1:/1gh/PlRBo0X1b2it0+qIMXQ1
Static task
static1
Behavioral task
behavioral1
Sample
0f54c107cf3daad4695390e86d3aa2d8769003cb254ca985022182a7ba0c44c4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0f54c107cf3daad4695390e86d3aa2d8769003cb254ca985022182a7ba0c44c4.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.chamakiotis.gr - Port:
587 - Username:
[email protected] - Password:
Fyr2q?93
Targets
-
-
Target
0f54c107cf3daad4695390e86d3aa2d8769003cb254ca985022182a7ba0c44c4.exe
-
Size
731KB
-
MD5
2b429a6f4dfe55f1224864d891fa1f3b
-
SHA1
275ff177de1de88c4a7803b01a9ea4ede8e96f8f
-
SHA256
0f54c107cf3daad4695390e86d3aa2d8769003cb254ca985022182a7ba0c44c4
-
SHA512
0378ae45cbf5811624e317e77b6d46fbbafafb7b49a15b3f87eb5040628ca732a343f52dcafcf6a23d9fd2f55d93f2cd02c3de15233556f4605761152fbfb45a
-
SSDEEP
12288:/1gh/PsZ1DX/VDJjXSRBofGXhX1MinvOitpm+DOX4MHEEvQ1:/1gh/PlRBo0X1b2it0+qIMXQ1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-