General
-
Target
2036-67-0x0000000000780000-0x00000000007B0000-memory.dmp
-
Size
192KB
-
Sample
230330-qsa8ascg98
-
MD5
c0120677c4037f5c2b4fd148ac813414
-
SHA1
332828bf40db13286463cec7877f3833b33e5cb5
-
SHA256
646959adc710ee8b9c068ee77793ea6b7d0522428ddb2408a8325dbbf487df5a
-
SHA512
613bd9b09e9fbd62e15c82803da38c66fe41dd9a71f69882cea12b3b7610bdea1ad45ea976d909f1b52d246622403d6237e45cfc9c12af9fcc7fe3390a5188d1
-
SSDEEP
3072:tgXowImeif1K21WJJU4pMsixMSHqFvI9KR2ImTIUN9:t4K2sJ1p0MIqd1wVT7N
Behavioral task
behavioral1
Sample
2036-67-0x0000000000780000-0x00000000007B0000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2036-67-0x0000000000780000-0x00000000007B0000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.tecnowares.com - Port:
587 - Username:
m.auletta@tecnowares.com - Password:
pY$WNuY3@@wed - Email To:
eretih@tecnowares.com
Targets
-
-
Target
2036-67-0x0000000000780000-0x00000000007B0000-memory.dmp
-
Size
192KB
-
MD5
c0120677c4037f5c2b4fd148ac813414
-
SHA1
332828bf40db13286463cec7877f3833b33e5cb5
-
SHA256
646959adc710ee8b9c068ee77793ea6b7d0522428ddb2408a8325dbbf487df5a
-
SHA512
613bd9b09e9fbd62e15c82803da38c66fe41dd9a71f69882cea12b3b7610bdea1ad45ea976d909f1b52d246622403d6237e45cfc9c12af9fcc7fe3390a5188d1
-
SSDEEP
3072:tgXowImeif1K21WJJU4pMsixMSHqFvI9KR2ImTIUN9:t4K2sJ1p0MIqd1wVT7N
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-