General
-
Target
5b1f4e2b1ae240311980d2f6186cf88e.bin
-
Size
540KB
-
Sample
230331-btpprahe3x
-
MD5
de39c8a9b793ec4b804a39842781c725
-
SHA1
7ba266b8ac5be79231b7a549c952dd481d54e43b
-
SHA256
2f88698d6605aa5a9ca6d0ee49228ab4e0c073b5a08096f46895d02f91d71e0c
-
SHA512
f5424d25f75290c964d1802aa30af440f29bc4b4f16e9d4b53030689a5b64eeb96074a1319a2a3b563686dcde8f758c9d393ec132b7d7d30be46c7236f09dd61
-
SSDEEP
12288:7a6vb8ixfIvi1Y9EcxRYelT5hD852MOFf4JU8yrF:2QQufIvOPcJT5FztWaF
Static task
static1
Behavioral task
behavioral1
Sample
5da1b3537b33feef0da4adcc435e682b875de40a6e3ce1024a6c5e483bda8ff1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5da1b3537b33feef0da4adcc435e682b875de40a6e3ce1024a6c5e483bda8ff1.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mibmglobal.com - Port:
587 - Username:
kavita@mibmglobal.com - Password:
mibmg3010! - Email To:
davidsurly1@gmail.com
Targets
-
-
Target
5da1b3537b33feef0da4adcc435e682b875de40a6e3ce1024a6c5e483bda8ff1.exe
-
Size
1.1MB
-
MD5
5b1f4e2b1ae240311980d2f6186cf88e
-
SHA1
36e0e9c15f9d21c9ecbd40ac3bdf03ab34245c82
-
SHA256
5da1b3537b33feef0da4adcc435e682b875de40a6e3ce1024a6c5e483bda8ff1
-
SHA512
42db37dbf80ce648f72e7afcb8be38b9c81c30e366531d913b9e690c69312d551ef217e343a8810e1c024124cc516df9108ecb299533357ad818e20bd1ab2162
-
SSDEEP
12288:zWHNC1Q/rusz7NxS+Q7+GvwP2FAihZ+YBtskhYT75geR5Of6oAGGomaJQWRu125X:sLGHK5EGjtWo1raPMVu
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-