General
-
Target
ca8fa28e5c22ef181ad92a37942b3afe6016700b
-
Size
844KB
-
Sample
230203-x3zrzadg2z
-
MD5
30e993cc05c9c2c17e1daebd3f0e3578
-
SHA1
ca8fa28e5c22ef181ad92a37942b3afe6016700b
-
SHA256
d55ed6edc1d88b77349bc30c36e8796e0fd1495f36b565c9300dff667860ce44
-
SHA512
ba10ff8ec012b913b5680170304c386f8904069d67b13efe4d28a0ef9c55c9c12a0be1fd2714c26b3f6fe639bf4ac8663bdb44c7bd508572af67743766a78aab
-
SSDEEP
24576:T1dH+AdHALvnP+/J8H49P6F0xMpqG4yPa:TPHrdHCP+/Ji4cWiq
Static task
static1
Behavioral task
behavioral1
Sample
ca8fa28e5c22ef181ad92a37942b3afe6016700b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ca8fa28e5c22ef181ad92a37942b3afe6016700b.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.btlntcrnet.com - Port:
587 - Username:
[email protected] - Password:
Gosky080$
Targets
-
-
Target
ca8fa28e5c22ef181ad92a37942b3afe6016700b
-
Size
844KB
-
MD5
30e993cc05c9c2c17e1daebd3f0e3578
-
SHA1
ca8fa28e5c22ef181ad92a37942b3afe6016700b
-
SHA256
d55ed6edc1d88b77349bc30c36e8796e0fd1495f36b565c9300dff667860ce44
-
SHA512
ba10ff8ec012b913b5680170304c386f8904069d67b13efe4d28a0ef9c55c9c12a0be1fd2714c26b3f6fe639bf4ac8663bdb44c7bd508572af67743766a78aab
-
SSDEEP
24576:T1dH+AdHALvnP+/J8H49P6F0xMpqG4yPa:TPHrdHCP+/Ji4cWiq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-