General
-
Target
a8bb4191a8a0dea730def8254967c80db1c2b7d7
-
Size
37KB
-
Sample
230203-x87d1aea9t
-
MD5
0a25dd5660057eb8fa23b8d57d1d4708
-
SHA1
a8bb4191a8a0dea730def8254967c80db1c2b7d7
-
SHA256
f3809eed8c6490f0e42711041dd0d7610ffc043759df52c873184052e36e2af1
-
SHA512
d07d53502f08ccf6662ad85155bac26f109fa2db3d01540370597f25641661212c7a65f6d67b2b49e790e3500dc8506aac59f1c58d926f579d4a3e4348bebb7a
-
SSDEEP
768:fevwNGja1TxGIP+tZSPXLgF43rt+cY/qt5RYVMyc/U24v:fNG21T4IP+tZKX8iJ+xqtfYzcr
Static task
static1
Behavioral task
behavioral1
Sample
a8bb4191a8a0dea730def8254967c80db1c2b7d7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a8bb4191a8a0dea730def8254967c80db1c2b7d7.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.strictfacilityservices.com - Port:
587 - Username:
[email protected] - Password:
SFS!@#321 - Email To:
[email protected]
Targets
-
-
Target
a8bb4191a8a0dea730def8254967c80db1c2b7d7
-
Size
37KB
-
MD5
0a25dd5660057eb8fa23b8d57d1d4708
-
SHA1
a8bb4191a8a0dea730def8254967c80db1c2b7d7
-
SHA256
f3809eed8c6490f0e42711041dd0d7610ffc043759df52c873184052e36e2af1
-
SHA512
d07d53502f08ccf6662ad85155bac26f109fa2db3d01540370597f25641661212c7a65f6d67b2b49e790e3500dc8506aac59f1c58d926f579d4a3e4348bebb7a
-
SSDEEP
768:fevwNGja1TxGIP+tZSPXLgF43rt+cY/qt5RYVMyc/U24v:fNG21T4IP+tZKX8iJ+xqtfYzcr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-