General
-
Target
0a232eac16fadbcea9f371d5f3832d808123297a
-
Size
440KB
-
Sample
230113-blw4vsge5s
-
MD5
40652392d1c0899c10858a9427423873
-
SHA1
0a232eac16fadbcea9f371d5f3832d808123297a
-
SHA256
72d186da41f7d6979ff9b012e4e5b5581da86946d60ffbc5870cc7b99dce192a
-
SHA512
e4e9fe0d9bcf958cfca895a0382c3b87bc95d488f70faba6df223609ef7c5f22731beec930bb5e5789e24e3926b76292b8d47a165732a1d58702073ece18455e
-
SSDEEP
12288:EYrIaib/25w27ww4vveYizJPWX+MBSFF/j:EYrIa6/2y1w4vvniZWueSrj
Static task
static1
Behavioral task
behavioral1
Sample
0a232eac16fadbcea9f371d5f3832d808123297a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0a232eac16fadbcea9f371d5f3832d808123297a.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sseximclearing.com - Port:
587 - Username:
[email protected] - Password:
Ssxm@9854 - Email To:
[email protected]
Targets
-
-
Target
0a232eac16fadbcea9f371d5f3832d808123297a
-
Size
440KB
-
MD5
40652392d1c0899c10858a9427423873
-
SHA1
0a232eac16fadbcea9f371d5f3832d808123297a
-
SHA256
72d186da41f7d6979ff9b012e4e5b5581da86946d60ffbc5870cc7b99dce192a
-
SHA512
e4e9fe0d9bcf958cfca895a0382c3b87bc95d488f70faba6df223609ef7c5f22731beec930bb5e5789e24e3926b76292b8d47a165732a1d58702073ece18455e
-
SSDEEP
12288:EYrIaib/25w27ww4vveYizJPWX+MBSFF/j:EYrIa6/2y1w4vvniZWueSrj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-