General
-
Target
2ada13943b92d98911f75e2844fe9beba7659cfeef2aaa521ff9df0fb4bf7f15
-
Size
1.1MB
-
Sample
230303-ct965afh72
-
MD5
6c83a9bc5ae73c1338b546e3bfea6f73
-
SHA1
052f100b19a867b1ac95a78e64eb620b7247f1f3
-
SHA256
2ada13943b92d98911f75e2844fe9beba7659cfeef2aaa521ff9df0fb4bf7f15
-
SHA512
5aa6c3da4d6dff11a281a89bd09a8b0eab09b215f54da3d8df76b538bb4c1ec5c669fa3bcf0547ec2d24548e8855d07c83aae6ebd23cdb46666aaecf4b5bb5c2
-
SSDEEP
12288:BUSz/NHa0szhlX6w1GnEq0GFPs0pXwn1W3ajBlMIDUAs0I9LNHyMj26QeYUSnNC+:p/NHm8jnEFVCgc3alllIJq9NC
Static task
static1
Behavioral task
behavioral1
Sample
2ada13943b92d98911f75e2844fe9beba7659cfeef2aaa521ff9df0fb4bf7f15.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
hnxqezadblabdsss
Targets
-
-
Target
2ada13943b92d98911f75e2844fe9beba7659cfeef2aaa521ff9df0fb4bf7f15
-
Size
1.1MB
-
MD5
6c83a9bc5ae73c1338b546e3bfea6f73
-
SHA1
052f100b19a867b1ac95a78e64eb620b7247f1f3
-
SHA256
2ada13943b92d98911f75e2844fe9beba7659cfeef2aaa521ff9df0fb4bf7f15
-
SHA512
5aa6c3da4d6dff11a281a89bd09a8b0eab09b215f54da3d8df76b538bb4c1ec5c669fa3bcf0547ec2d24548e8855d07c83aae6ebd23cdb46666aaecf4b5bb5c2
-
SSDEEP
12288:BUSz/NHa0szhlX6w1GnEq0GFPs0pXwn1W3ajBlMIDUAs0I9LNHyMj26QeYUSnNC+:p/NHm8jnEFVCgc3alllIJq9NC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-