General
-
Target
eab690ef360c920d17f1fe58b42f970ecfe0e5917577b39df8c4e3e0928e251e
-
Size
1.0MB
-
Sample
221210-ebezdahf7w
-
MD5
5412eda3615d696f56ae2dbffd4690a2
-
SHA1
65808d9afa29c2143a81ee38f6cf090efa22f933
-
SHA256
eab690ef360c920d17f1fe58b42f970ecfe0e5917577b39df8c4e3e0928e251e
-
SHA512
b807f3f33b51dacd3644263c08730cb714cbdac2b95b78746e6f4d4c1ad157fbf81965c0017306967ee0920cba2c546171819b2b34d660b3e382a354a633c68f
-
SSDEEP
24576:ytU2UGFJIXdxOZqfKH3ihLvUVsITY1xen66pFmf:y39XIXTiShLvUY3e6
Static task
static1
Behavioral task
behavioral1
Sample
eab690ef360c920d17f1fe58b42f970ecfe0e5917577b39df8c4e3e0928e251e.exe
Resource
win10-20220901-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.trualliant.com - Port:
587 - Username:
[email protected] - Password:
trualliant123 - Email To:
[email protected]
Targets
-
-
Target
eab690ef360c920d17f1fe58b42f970ecfe0e5917577b39df8c4e3e0928e251e
-
Size
1.0MB
-
MD5
5412eda3615d696f56ae2dbffd4690a2
-
SHA1
65808d9afa29c2143a81ee38f6cf090efa22f933
-
SHA256
eab690ef360c920d17f1fe58b42f970ecfe0e5917577b39df8c4e3e0928e251e
-
SHA512
b807f3f33b51dacd3644263c08730cb714cbdac2b95b78746e6f4d4c1ad157fbf81965c0017306967ee0920cba2c546171819b2b34d660b3e382a354a633c68f
-
SSDEEP
24576:ytU2UGFJIXdxOZqfKH3ihLvUVsITY1xen66pFmf:y39XIXTiShLvUY3e6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-