General
-
Target
2921d55133a73a7920babfacf4f58158
-
Size
612KB
-
Sample
230417-bya26acf64
-
MD5
2921d55133a73a7920babfacf4f58158
-
SHA1
3cf52c0fbe1bfa0635c48767ec45980c305cc671
-
SHA256
1a463ce1a2cb5426150838a4af8c8cd7acd6f71907f6cf4af63c16d2f6c4e695
-
SHA512
94dc971aeb6713b669dff00679517fa93cbd215443536a06dadd9c9f7f56b123a778d255ecf58d4279a91ac45d83049eac8133e78799a43793953c1ed0c39a08
-
SSDEEP
12288:3Fs3ZKrWLgSWh8zBpbStH8AhfbRAXSf0+bFh2dv:3C3ZGqgfhY6590+bFhA
Static task
static1
Behavioral task
behavioral1
Sample
2921d55133a73a7920babfacf4f58158.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2921d55133a73a7920babfacf4f58158.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
HNnNLPY3 - Email To:
[email protected]
Targets
-
-
Target
2921d55133a73a7920babfacf4f58158
-
Size
612KB
-
MD5
2921d55133a73a7920babfacf4f58158
-
SHA1
3cf52c0fbe1bfa0635c48767ec45980c305cc671
-
SHA256
1a463ce1a2cb5426150838a4af8c8cd7acd6f71907f6cf4af63c16d2f6c4e695
-
SHA512
94dc971aeb6713b669dff00679517fa93cbd215443536a06dadd9c9f7f56b123a778d255ecf58d4279a91ac45d83049eac8133e78799a43793953c1ed0c39a08
-
SSDEEP
12288:3Fs3ZKrWLgSWh8zBpbStH8AhfbRAXSf0+bFh2dv:3C3ZGqgfhY6590+bFhA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-