General
-
Target
1218f92a6481719618c36f3b7abf074e.exe
-
Size
972KB
-
Sample
230301-yhhtdshe3w
-
MD5
1218f92a6481719618c36f3b7abf074e
-
SHA1
77b015bdc543978bd9a3410ebf39142e4c67d37e
-
SHA256
b97359d81ff705942e503b8a9636d0260a6de0d6c7d00fe6a104e6413eebf5b6
-
SHA512
7b5f5a405f40d6f14e0e576a74311e1bd4e0b97f7856dc8c8e6adde37615651f457c11036d440aaa8332d3d9fee53cccefeada656f859fe471bfd69d19cae4d7
-
SSDEEP
24576:UCJIwS2uad39HebGTQ/HckETCItSLJws+:UC19ptAekcNhSFG
Static task
static1
Behavioral task
behavioral1
Sample
1218f92a6481719618c36f3b7abf074e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1218f92a6481719618c36f3b7abf074e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
wEqaPpm7 - Email To:
[email protected]
Targets
-
-
Target
1218f92a6481719618c36f3b7abf074e.exe
-
Size
972KB
-
MD5
1218f92a6481719618c36f3b7abf074e
-
SHA1
77b015bdc543978bd9a3410ebf39142e4c67d37e
-
SHA256
b97359d81ff705942e503b8a9636d0260a6de0d6c7d00fe6a104e6413eebf5b6
-
SHA512
7b5f5a405f40d6f14e0e576a74311e1bd4e0b97f7856dc8c8e6adde37615651f457c11036d440aaa8332d3d9fee53cccefeada656f859fe471bfd69d19cae4d7
-
SSDEEP
24576:UCJIwS2uad39HebGTQ/HckETCItSLJws+:UC19ptAekcNhSFG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-