General
-
Target
c8f04635049883e3151531fd25e7e0d3f50b336c5beed67923844d9de861cf79.exe
-
Size
671KB
-
Sample
230608-masg3sef8z
-
MD5
152e3b313207ea19b8428a4f7e2fb3b5
-
SHA1
323aab87798142d5a2fbf06affaf935cbb95cad5
-
SHA256
c8f04635049883e3151531fd25e7e0d3f50b336c5beed67923844d9de861cf79
-
SHA512
3ef5eecb8fcf25263197a83e225f6208bdecb394e469fa7f665301a875fdf3a40a7b1102669a3705a9ee56b677ac44615e69df974081a01e518a8e25dda984c3
-
SSDEEP
12288:LV9gxNbAdywa2ppVoDVr0JgqRliS0OQwwrHjGu:LDsgMDdmgCiTOazjN
Static task
static1
Behavioral task
behavioral1
Sample
c8f04635049883e3151531fd25e7e0d3f50b336c5beed67923844d9de861cf79.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c8f04635049883e3151531fd25e7e0d3f50b336c5beed67923844d9de861cf79.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.zoho.eu - Port:
587 - Username:
[email protected] - Password:
Babanla1
Extracted
Protocol: smtp- Host:
smtp.zoho.eu - Port:
587 - Username:
[email protected] - Password:
Babanla1
Targets
-
-
Target
c8f04635049883e3151531fd25e7e0d3f50b336c5beed67923844d9de861cf79.exe
-
Size
671KB
-
MD5
152e3b313207ea19b8428a4f7e2fb3b5
-
SHA1
323aab87798142d5a2fbf06affaf935cbb95cad5
-
SHA256
c8f04635049883e3151531fd25e7e0d3f50b336c5beed67923844d9de861cf79
-
SHA512
3ef5eecb8fcf25263197a83e225f6208bdecb394e469fa7f665301a875fdf3a40a7b1102669a3705a9ee56b677ac44615e69df974081a01e518a8e25dda984c3
-
SSDEEP
12288:LV9gxNbAdywa2ppVoDVr0JgqRliS0OQwwrHjGu:LDsgMDdmgCiTOazjN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-