General
-
Target
3.exe
-
Size
476KB
-
Sample
221209-nllpcada68
-
MD5
8eabbd8a98fa5f832cc89aa37fb596ce
-
SHA1
4428ff2dca82a79453ac64af960d94905f008594
-
SHA256
a9cf955162a9164b63c70530a2ed72b02ab53f7b39a3a9ece842cd2bebfb117c
-
SHA512
d42b9576d148ecd46998702031d7d309915ecac30f36028f6f5ec62883a20a8a8cb68a1624db40e9510b609ab9370684b2dc466c61a81cf6d1a7a6c1bd058489
-
SSDEEP
6144:4M0Nm8zFe6ytzIP0OAqUmYxO+C8r00F6mBf2UiHwtYv5uqa6XUpZPmr94aSfEXF5:4fNyhO+U6uPGYhCE1FRlYhLWPHQMlD
Static task
static1
Behavioral task
behavioral1
Sample
3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@# - Email To:
[email protected]
Targets
-
-
Target
3.exe
-
Size
476KB
-
MD5
8eabbd8a98fa5f832cc89aa37fb596ce
-
SHA1
4428ff2dca82a79453ac64af960d94905f008594
-
SHA256
a9cf955162a9164b63c70530a2ed72b02ab53f7b39a3a9ece842cd2bebfb117c
-
SHA512
d42b9576d148ecd46998702031d7d309915ecac30f36028f6f5ec62883a20a8a8cb68a1624db40e9510b609ab9370684b2dc466c61a81cf6d1a7a6c1bd058489
-
SSDEEP
6144:4M0Nm8zFe6ytzIP0OAqUmYxO+C8r00F6mBf2UiHwtYv5uqa6XUpZPmr94aSfEXF5:4fNyhO+U6uPGYhCE1FRlYhLWPHQMlD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-