General
-
Target
7a5d6fb2a5427145f0df260b9474196452f23109a8dd6e317c1853de93a5406c
-
Size
868KB
-
Sample
230209-mznv7ahd57
-
MD5
5e18728978c1e620cf189bf6930d920a
-
SHA1
72f684c4aeeca562bce9b6c442cb3980b3a2672c
-
SHA256
7a5d6fb2a5427145f0df260b9474196452f23109a8dd6e317c1853de93a5406c
-
SHA512
8028ece4bdc2df82a02de5b15588514dc2318aec160033d540a2040c484ef81a5449eb815e6f6ce8deefec847c24ec8e9281f9014f021cee6050b4f754da9f51
-
SSDEEP
24576:jHCtn9BoO/NESQlQXDZ9zaBtBRWjba2E+s/D7sjJteP8X8u9:QmKN92tRWvaj/DGre0Xf
Static task
static1
Behavioral task
behavioral1
Sample
7a5d6fb2a5427145f0df260b9474196452f23109a8dd6e317c1853de93a5406c.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
hnxqezadblabdsss
Targets
-
-
Target
7a5d6fb2a5427145f0df260b9474196452f23109a8dd6e317c1853de93a5406c
-
Size
868KB
-
MD5
5e18728978c1e620cf189bf6930d920a
-
SHA1
72f684c4aeeca562bce9b6c442cb3980b3a2672c
-
SHA256
7a5d6fb2a5427145f0df260b9474196452f23109a8dd6e317c1853de93a5406c
-
SHA512
8028ece4bdc2df82a02de5b15588514dc2318aec160033d540a2040c484ef81a5449eb815e6f6ce8deefec847c24ec8e9281f9014f021cee6050b4f754da9f51
-
SSDEEP
24576:jHCtn9BoO/NESQlQXDZ9zaBtBRWjba2E+s/D7sjJteP8X8u9:QmKN92tRWvaj/DGre0Xf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-