General
-
Target
7116f819cf1a305e813cb1bf9d3667fdc18efd1d5ed7e6c5a3afe92c1040addb
-
Size
671KB
-
Sample
230206-q5976ahd8t
-
MD5
c6c411e749421c20ddd6183e67cd2fba
-
SHA1
2c9a0478c00fc7057d2dd341c9d66e84f5e9f262
-
SHA256
7116f819cf1a305e813cb1bf9d3667fdc18efd1d5ed7e6c5a3afe92c1040addb
-
SHA512
b8ad2c2d605249b57e387dc5a1a1a46e0e267714c775c4951b53abc74834de95bbd6bceda75ad458645c4dd6cb8297354dfebc46175eda85d6e424c9334b7d72
-
SSDEEP
12288:yaQvqIu4Qs6RLVw/7hj6bNKOpTgDWeh3ih9HfA:su4ipOF65K6MBYT4
Static task
static1
Behavioral task
behavioral1
Sample
7116f819cf1a305e813cb1bf9d3667fdc18efd1d5ed7e6c5a3afe92c1040addb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7116f819cf1a305e813cb1bf9d3667fdc18efd1d5ed7e6c5a3afe92c1040addb.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
Chibuonyenze8888 - Email To:
[email protected]
Targets
-
-
Target
7116f819cf1a305e813cb1bf9d3667fdc18efd1d5ed7e6c5a3afe92c1040addb
-
Size
671KB
-
MD5
c6c411e749421c20ddd6183e67cd2fba
-
SHA1
2c9a0478c00fc7057d2dd341c9d66e84f5e9f262
-
SHA256
7116f819cf1a305e813cb1bf9d3667fdc18efd1d5ed7e6c5a3afe92c1040addb
-
SHA512
b8ad2c2d605249b57e387dc5a1a1a46e0e267714c775c4951b53abc74834de95bbd6bceda75ad458645c4dd6cb8297354dfebc46175eda85d6e424c9334b7d72
-
SSDEEP
12288:yaQvqIu4Qs6RLVw/7hj6bNKOpTgDWeh3ih9HfA:su4ipOF65K6MBYT4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-