General
-
Target
1672-67-0x00000000043B0000-0x00000000043E8000-memory.dmp
-
Size
224KB
-
Sample
221208-qz3acsab76
-
MD5
af1cf1393b3f78784a3c88348c22c9d1
-
SHA1
3a138db9917c84d4854a6b62a90bbf67d5dfddd2
-
SHA256
23e533e2956c82346e8b8eef23abc801713a6d96e34b488937c9346e300ed691
-
SHA512
0c711321d4929dc462d6db42402adfc82456621b9120f6878997591888708e7ea184f8c8e42ac28e1c75388eb182548f039933fc3f0c28a7ba32617bb4ed4f66
-
SSDEEP
3072:zJ89MLHabeiLOD4KYgpvHmJOU5HItNDa6+kmJro/MsoeCGLcNysSigbJIPDqi:SKLGKPoOU9ItNDl+kmxoUHTmigb+P
Behavioral task
behavioral1
Sample
1672-67-0x00000000043B0000-0x00000000043E8000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1672-67-0x00000000043B0000-0x00000000043E8000-memory.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.majestictravel.gr - Port:
587 - Username:
accommodation@majestictravel.gr - Password:
!acc#@541@
Targets
-
-
Target
1672-67-0x00000000043B0000-0x00000000043E8000-memory.dmp
-
Size
224KB
-
MD5
af1cf1393b3f78784a3c88348c22c9d1
-
SHA1
3a138db9917c84d4854a6b62a90bbf67d5dfddd2
-
SHA256
23e533e2956c82346e8b8eef23abc801713a6d96e34b488937c9346e300ed691
-
SHA512
0c711321d4929dc462d6db42402adfc82456621b9120f6878997591888708e7ea184f8c8e42ac28e1c75388eb182548f039933fc3f0c28a7ba32617bb4ed4f66
-
SSDEEP
3072:zJ89MLHabeiLOD4KYgpvHmJOU5HItNDa6+kmJro/MsoeCGLcNysSigbJIPDqi:SKLGKPoOU9ItNDl+kmxoUHTmigb+P
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-