General
-
Target
5F1ZPslhHzSadav.exe
-
Size
711KB
-
Sample
221221-z8fmdsge5t
-
MD5
d188df2c24d7c2e992c0ed5279205282
-
SHA1
92e9d8a9f82c1bb905f8408e07b4823372b8700a
-
SHA256
62ad91656c577fa5c1825d312c047e64f1de085e55339b47199f0849afb1b3ff
-
SHA512
5f13e6e2777fc24dbb0731674717bcac5da31aaa228a054fac6c7334f1a92cf750ae83565c90c2384ad82ef80f0d1ba6126e4dff1e8a5482d8502d3e88833b18
-
SSDEEP
12288:YTDmomPZef+mvK0cYdJKAw62RLGHxuOz+vZPd4e7y+252ZlUCbFXTcWZrE3F:Ymomxi+50cYdJ2BRj7yfQPjbm
Static task
static1
Behavioral task
behavioral1
Sample
5F1ZPslhHzSadav.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5F1ZPslhHzSadav.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.chinarcnd.com - Port:
587 - Username:
[email protected] - Password:
mNQrnR%3
Extracted
agenttesla
Protocol: smtp- Host:
smtp.chinarcnd.com - Port:
587 - Username:
[email protected] - Password:
mNQrnR%3
Targets
-
-
Target
5F1ZPslhHzSadav.exe
-
Size
711KB
-
MD5
d188df2c24d7c2e992c0ed5279205282
-
SHA1
92e9d8a9f82c1bb905f8408e07b4823372b8700a
-
SHA256
62ad91656c577fa5c1825d312c047e64f1de085e55339b47199f0849afb1b3ff
-
SHA512
5f13e6e2777fc24dbb0731674717bcac5da31aaa228a054fac6c7334f1a92cf750ae83565c90c2384ad82ef80f0d1ba6126e4dff1e8a5482d8502d3e88833b18
-
SSDEEP
12288:YTDmomPZef+mvK0cYdJKAw62RLGHxuOz+vZPd4e7y+252ZlUCbFXTcWZrE3F:Ymomxi+50cYdJ2BRj7yfQPjbm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-