General
-
Target
8669367817.zip
-
Size
432KB
-
Sample
230111-r7bm2shb5z
-
MD5
dca2b43db6848a06e75aa147bee30d40
-
SHA1
3c4b4fa8c1749e8827031609233307c3bde3daab
-
SHA256
0094b6ea7de18ccbf0999cd4b152e53b2f977d8651f6a4a0e6daf0b5879b6e3f
-
SHA512
9870ad633467d0024d7696878baa6332aa628257f3cd9f93fa628947659a6ee1f5fc4c927ceb79d3162cc34e3005fbd4403f095c6e8e3e37aaa18a77b3e474af
-
SSDEEP
12288:emmSEqpCrfkAcG5AuZ/1KI0jzAx03uz7Mts:emVtCrfkAlnNB0jzAxWbu
Static task
static1
Behavioral task
behavioral1
Sample
iiikkkkkk.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
iiikkkkkk.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sseximclearing.com - Port:
587 - Username:
[email protected] - Password:
Ssxm@9854 - Email To:
[email protected]
Targets
-
-
Target
iiikkkkkk.exe
-
Size
520KB
-
MD5
81afd327d33943a201ec1a8f0f70c811
-
SHA1
58be06bde949a8d19c2597a7ce34b2c5b05ed40d
-
SHA256
1a899f1e28f14e24edb2f8f6ccaefaa0a865b3ff25fb47ca00e768bd9acbaf44
-
SHA512
6a6da5047fdc59226e323e9369b9c5c1825290d59c1519c0d3aa4c1a70782644bb10274323610eb4d54bd9a87742900ab259d639839227aefae3cfef72f684fd
-
SSDEEP
12288:KYakzucEkYIvjMekosOIRvTtUqq02gKD27n:KYaezEkZvjMekorIdtUhqWg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-