General
-
Target
ceb7360515aa7e471ab8d71d8db60ee4.bin
-
Size
370KB
-
Sample
231005-cnczfaab32
-
MD5
67e68782aa9edbc5188418ff0e543813
-
SHA1
695f76262b8a7b75f20e04fa5b9cef7a8afa2e80
-
SHA256
cca212170ac2b6a8f69c873b035a368c1e974d56058adadac628752d0464f8cd
-
SHA512
b6f7effadb2baa4f573c88ebac666d00e563b3c375d091e8ad2a7b2872d02869d6ae55f3d0e78a81e27d4dcba421b28d8e5bbd9035ef600ac0bbf5e0e33e1d2f
-
SSDEEP
6144:ScesngqBQpxu1DLp/CFG+bJJgdodS2o0Q7qRo76F9wsMoVB9BPwIPjaBfvvwenR:Tesn1Qpxu1DLpqk+EdodS2o0Q7qRgEuh
Static task
static1
Behavioral task
behavioral1
Sample
747bda3ff9c92152209f373690f37337288a013504d676611041fe577877f898.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
747bda3ff9c92152209f373690f37337288a013504d676611041fe577877f898.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
MAIL.gcsho.com - Port:
587 - Username:
[email protected] - Password:
global321# - Email To:
[email protected]
Targets
-
-
Target
747bda3ff9c92152209f373690f37337288a013504d676611041fe577877f898.exe
-
Size
468KB
-
MD5
ceb7360515aa7e471ab8d71d8db60ee4
-
SHA1
ebd58701a518b1144b3013b13a56249abc64a7db
-
SHA256
747bda3ff9c92152209f373690f37337288a013504d676611041fe577877f898
-
SHA512
41a65f2912f6880f3129e9185feedbfbe5d230b76722f610e6d12baf21027f571323a44f0b4278368c197638f2a0c2329e7662db23bfc333797d5fe48d9c1e0d
-
SSDEEP
6144:boVSWGOhF5wIohI84eGaSQy9C54yyi3uV9WvRXf7tgX/uPNLrDb2m/yzCSll9kHn:cUOhF5YvxSQy9j6uVU9OUrDF/yuH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-