General
-
Target
d5ff206d2f2bdc833412b9a3b94ece74bbb1c61cf3cb829768760bb14f819ac3
-
Size
1023KB
-
Sample
221209-l3e7sach59
-
MD5
7907358ffb7b4c5e48eb64d7e8e3a919
-
SHA1
704fc9f739546a4366073c956bf4fb38dff43baf
-
SHA256
d5ff206d2f2bdc833412b9a3b94ece74bbb1c61cf3cb829768760bb14f819ac3
-
SHA512
d2f83f626a7e2bf93842887807ea9788ee1a9a2a398b69a2ed53e54364f2e5f7ce47d05ab51ec0bfeb670e35f2ca7f166105ca241a38e94b09c1a8f690d80dc7
-
SSDEEP
24576:ofaR+0ANOGT0JW4dvBXEA4AqFUgNpyAChTzpFz:/ZAcG095EjegNpyn
Static task
static1
Behavioral task
behavioral1
Sample
d5ff206d2f2bdc833412b9a3b94ece74bbb1c61cf3cb829768760bb14f819ac3.exe
Resource
win10-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.trualliant.com - Port:
587 - Username:
[email protected] - Password:
trualliant123 - Email To:
[email protected]
Targets
-
-
Target
d5ff206d2f2bdc833412b9a3b94ece74bbb1c61cf3cb829768760bb14f819ac3
-
Size
1023KB
-
MD5
7907358ffb7b4c5e48eb64d7e8e3a919
-
SHA1
704fc9f739546a4366073c956bf4fb38dff43baf
-
SHA256
d5ff206d2f2bdc833412b9a3b94ece74bbb1c61cf3cb829768760bb14f819ac3
-
SHA512
d2f83f626a7e2bf93842887807ea9788ee1a9a2a398b69a2ed53e54364f2e5f7ce47d05ab51ec0bfeb670e35f2ca7f166105ca241a38e94b09c1a8f690d80dc7
-
SSDEEP
24576:ofaR+0ANOGT0JW4dvBXEA4AqFUgNpyAChTzpFz:/ZAcG095EjegNpyn
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-