General
-
Target
a612ca41940e6b375c3ee12756558677.bin
-
Size
507KB
-
Sample
230628-b136qafh86
-
MD5
20fc37c13a80cbde48d1180411809584
-
SHA1
ee01babb44dc764c86a85adf7e36ce18a5652ad2
-
SHA256
f2ff92c7dd6748816f2ae27c9e1628f3865800587738d935d4cb8610069bd205
-
SHA512
d6f1420249de0f62bf7e4ca33393f604470110d1fce9be0bd1ee59913e96fd33b5123701e04abf9559a6a1d8d0c62c965aa3a6cd9a8ce083659d55918632a454
-
SSDEEP
12288:cUoDeq4Ue8aneK0E0d4gdUvzKoya4lYQONDfw+ma1QDCcYjY6:cUoDUD8anUddVONDo9aTY6
Static task
static1
Behavioral task
behavioral1
Sample
EBKG05955223.pdf.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
EBKG05955223.pdf.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
JUGCRsm9 - Email To:
[email protected]
Targets
-
-
Target
EBKG05955223.pdf.exe
-
Size
642KB
-
MD5
7a2e19cad080f0a6bb6daf77b9d268c1
-
SHA1
166ec48cbc96c86f6631da9c8e7433f7a9c83a32
-
SHA256
4644d82860cef54c8cd84971e923baa8ddc0347375701c7dbf5a884bb1c5771c
-
SHA512
f96e0e854a5f603efb0d6a32f412fa2153e5ed7f7faa0c92b7e08869c5ede00c5e7480703372f96c900d5fe3398ac3259d513b0f89f5d7d9e5743156cffa64a1
-
SSDEEP
12288:P5dPG2ffl/8eKIcyCnjRFLG2FgnQNKmbAj34mJq6Kg:NfFbKnjXGtQNWt4g
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-