General
-
Target
4367a4092b69619685efc9aae101ab6c.exe
-
Size
1004KB
-
Sample
230307-rwva1sad88
-
MD5
4367a4092b69619685efc9aae101ab6c
-
SHA1
68456fcab5d46b5ddeda455273addddbd28713e0
-
SHA256
c7118fec7d8d5039bdddef1ca99be4a490a036a792cd65085c61814848667fe8
-
SHA512
cb1867a370dffc9026f09cea5a678012d76d98d04e9d1c2957d135644624f6881b857d1a0023939b4bdff97bed792be3d69f73edd08da3d03cdcbb8d9562c4a8
-
SSDEEP
24576:NIYNUfqBpIDlcYdzWbyWp7Ly3YgoBeiZ7UaTAo6D7c:RNHqcszep7LJgowiZ7Ui6D7
Static task
static1
Behavioral task
behavioral1
Sample
4367a4092b69619685efc9aae101ab6c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4367a4092b69619685efc9aae101ab6c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
aaUW!^r5 aaUW!^r5 - Email To:
[email protected]
Targets
-
-
Target
4367a4092b69619685efc9aae101ab6c.exe
-
Size
1004KB
-
MD5
4367a4092b69619685efc9aae101ab6c
-
SHA1
68456fcab5d46b5ddeda455273addddbd28713e0
-
SHA256
c7118fec7d8d5039bdddef1ca99be4a490a036a792cd65085c61814848667fe8
-
SHA512
cb1867a370dffc9026f09cea5a678012d76d98d04e9d1c2957d135644624f6881b857d1a0023939b4bdff97bed792be3d69f73edd08da3d03cdcbb8d9562c4a8
-
SSDEEP
24576:NIYNUfqBpIDlcYdzWbyWp7Ly3YgoBeiZ7UaTAo6D7c:RNHqcszep7LJgowiZ7Ui6D7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-