General
-
Target
7a2e19cad080f0a6bb6daf77b9d268c1.bin
-
Size
514KB
-
Sample
230628-bs1qmagh7t
-
MD5
b84012178e660bf2dd4f68fe8b78ad83
-
SHA1
c86f352df5a860e606a9136cf5e30eb66d10465d
-
SHA256
8c63ec3e59c8e215b6b3adc7f60bd32e8fffa71916e13f3a8a3bdf7d35aa852f
-
SHA512
c67a1193b2867a3529cb39ac87ef034832cc8e67d262e11ea9bb94e664ad96e0e0a51be0bf1684decfcb40ed300122c1c06b333e37a9a3ea929070d3b64c60ed
-
SSDEEP
12288:2Rs3HFRvlURymqbt4eEwzzctU4xsM0qDZXaVpfQcg40KZO7:FrNTb2BtUrwio32O7
Static task
static1
Behavioral task
behavioral1
Sample
4644d82860cef54c8cd84971e923baa8ddc0347375701c7dbf5a884bb1c5771c.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
4644d82860cef54c8cd84971e923baa8ddc0347375701c7dbf5a884bb1c5771c.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
JUGCRsm9 - Email To:
[email protected]
Targets
-
-
Target
4644d82860cef54c8cd84971e923baa8ddc0347375701c7dbf5a884bb1c5771c.exe
-
Size
642KB
-
MD5
7a2e19cad080f0a6bb6daf77b9d268c1
-
SHA1
166ec48cbc96c86f6631da9c8e7433f7a9c83a32
-
SHA256
4644d82860cef54c8cd84971e923baa8ddc0347375701c7dbf5a884bb1c5771c
-
SHA512
f96e0e854a5f603efb0d6a32f412fa2153e5ed7f7faa0c92b7e08869c5ede00c5e7480703372f96c900d5fe3398ac3259d513b0f89f5d7d9e5743156cffa64a1
-
SSDEEP
12288:P5dPG2ffl/8eKIcyCnjRFLG2FgnQNKmbAj34mJq6Kg:NfFbKnjXGtQNWt4g
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-