General
-
Target
acfcd52f757d0f4526e651d78.exe
-
Size
776KB
-
Sample
230705-nzczcsde4w
-
MD5
b92d4046b60d24d92221ac6573bea986
-
SHA1
fd7c9c5ea9d35f42b5e7eef868d879655df90fab
-
SHA256
acfcd52f757d0f4526e651d7823f1d0eb93a37843b44d56c5b2f7f4a9edfd0b9
-
SHA512
d6686b1e0888bc4dfdd417775a28c6de6e20aebff4578f5a95cab0e27b2a3932f85a375e50b8673ce2fe084e1b8ec9bcdd471e856170977fc0288066b338b7f3
-
SSDEEP
24576:yiOV/NOaTOnehL5al0T/xnxxTH80GJByMS:yiOV/NOaTCehL5ayxnxxg0GJBzS
Static task
static1
Behavioral task
behavioral1
Sample
acfcd52f757d0f4526e651d78.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
acfcd52f757d0f4526e651d78.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
!Gphfth8 - Email To:
[email protected]
Targets
-
-
Target
acfcd52f757d0f4526e651d78.exe
-
Size
776KB
-
MD5
b92d4046b60d24d92221ac6573bea986
-
SHA1
fd7c9c5ea9d35f42b5e7eef868d879655df90fab
-
SHA256
acfcd52f757d0f4526e651d7823f1d0eb93a37843b44d56c5b2f7f4a9edfd0b9
-
SHA512
d6686b1e0888bc4dfdd417775a28c6de6e20aebff4578f5a95cab0e27b2a3932f85a375e50b8673ce2fe084e1b8ec9bcdd471e856170977fc0288066b338b7f3
-
SSDEEP
24576:yiOV/NOaTOnehL5al0T/xnxxTH80GJByMS:yiOV/NOaTCehL5ayxnxxg0GJBzS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-