General
-
Target
eca0e8b6d6b4791d76996078a.exe
-
Size
164KB
-
Sample
230704-q92ftafc8v
-
MD5
f9f9e4152d05f9484e22f1a588d7d349
-
SHA1
43b0705c3e4324995188df1f9722ed830c67f21a
-
SHA256
eca0e8b6d6b4791d76996078a45917d4e96c769a82b521ed2783130063b39a09
-
SHA512
3212a7040f37fe909d79049cfc17b769cbaeb3cdc0d29e7a39388866a6944fd8143bb153843352b21d424cb4b005e141e91d8577b63f93f68563b50b2a45c463
-
SSDEEP
3072:mmwqIeWaJVjecyFYK0Ec8fOuyv21D3j0/DQ:RIeZ9ecyFYK647130
Behavioral task
behavioral1
Sample
eca0e8b6d6b4791d76996078a.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
eca0e8b6d6b4791d76996078a.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gimpex-imerys.com - Port:
587 - Username:
[email protected] - Password:
h45ZVRb6(IMF - Email To:
[email protected]
Targets
-
-
Target
eca0e8b6d6b4791d76996078a.exe
-
Size
164KB
-
MD5
f9f9e4152d05f9484e22f1a588d7d349
-
SHA1
43b0705c3e4324995188df1f9722ed830c67f21a
-
SHA256
eca0e8b6d6b4791d76996078a45917d4e96c769a82b521ed2783130063b39a09
-
SHA512
3212a7040f37fe909d79049cfc17b769cbaeb3cdc0d29e7a39388866a6944fd8143bb153843352b21d424cb4b005e141e91d8577b63f93f68563b50b2a45c463
-
SSDEEP
3072:mmwqIeWaJVjecyFYK0Ec8fOuyv21D3j0/DQ:RIeZ9ecyFYK647130
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-