General
-
Target
tmp
-
Size
808KB
-
Sample
230315-1fby6sfd64
-
MD5
6233af52c0d7370ac2e171082eb42ab3
-
SHA1
cc49c07a297f5fc59ac92a17cd58aff809d196ca
-
SHA256
94050c1bf88c84d698a636916155475a4501012d9b75cc38b6e344490470cac7
-
SHA512
804bbe3f2be58e6dfc28bd23c322d2551227bd395783bd05a154900c497816d6115c3e6060356b057e43de4c1a9ce2540bb95ba1bef443ffcae912fbd4315924
-
SSDEEP
12288:FzAuV3iJGRTwdKc8/6r4YdQKg6fE8CL4Bct3DNcuODkyja5gz71Th3/z/66RPo9Z:pVyJT78CzfpCak3+DTSUz6sOAH
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.leavepostdesks.com - Port:
587 - Username:
[email protected] - Password:
Bigbrain2022# - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.leavepostdesks.com - Port:
587 - Username:
[email protected] - Password:
Bigbrain2022#
Targets
-
-
Target
tmp
-
Size
808KB
-
MD5
6233af52c0d7370ac2e171082eb42ab3
-
SHA1
cc49c07a297f5fc59ac92a17cd58aff809d196ca
-
SHA256
94050c1bf88c84d698a636916155475a4501012d9b75cc38b6e344490470cac7
-
SHA512
804bbe3f2be58e6dfc28bd23c322d2551227bd395783bd05a154900c497816d6115c3e6060356b057e43de4c1a9ce2540bb95ba1bef443ffcae912fbd4315924
-
SSDEEP
12288:FzAuV3iJGRTwdKc8/6r4YdQKg6fE8CL4Bct3DNcuODkyja5gz71Th3/z/66RPo9Z:pVyJT78CzfpCak3+DTSUz6sOAH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-