General
-
Target
Quote_2200001635_1.img
-
Size
1.3MB
-
Sample
230207-s6m55aff5x
-
MD5
8db5b9ff05fc565772066267f3d7ebb8
-
SHA1
61baceec32f9b4a8cabf76dee5e337e7f181f8a3
-
SHA256
8effb289d9291d7d06179ea83bb18d53723279f0cd5fd9a11f00309f066e9f58
-
SHA512
00af7103ab861930bf01ac9ef0f0fa7eff52efe50bee49e2804cc1fb2cca4997dce9903f434ac39e025783355ab7abe66ed8ed7a4f5d67d45a38f357c679d9b9
-
SSDEEP
24576:SrxN5IC54TWMwzz8rQASF1mb+HOZV9pA:StgiJorQAO1mEOZfu
Static task
static1
Behavioral task
behavioral1
Sample
QUOTE_22.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
QUOTE_22.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
QUOTE_22.EXE
-
Size
762KB
-
MD5
bb7da07b2fe227dabe3bca346b7150b6
-
SHA1
356bf616666407fd318db616382722e45259538d
-
SHA256
7f490d0ca36f65c1a3e08dbfb095c6b9bf26b7db071c624675635013a5c34cde
-
SHA512
1d560ed48047f9162ea5a9964faae9ea3a0cfd0b9a1f0ddf24d7d66a3e40eadb2c51a51fca8204cafa1c93f03c6a410cc9b3890ed523ada1ce7e7757d1f745fe
-
SSDEEP
12288:tOrx7p58lCrd4gyQapWMsR21lyllKG8rQeTS8Q7Rmb0jRtHjqvb9Cpg9dPA:YrxN5IC54TWMwzz8rQASF1mb+HOZV9p
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-