General
-
Target
NEAS.50fe7ddabbbff231e332c4b4eccf306e0b5b7fbc6224dde7994c8b45a0cc86b0rar_JC.rar
-
Size
69KB
-
Sample
231103-wm7l7sfh4s
-
MD5
f8f9db653ef431e40b7009ca1d7206f1
-
SHA1
d66b8a39f7806e5cf37ebd6db3e235220f78344c
-
SHA256
50fe7ddabbbff231e332c4b4eccf306e0b5b7fbc6224dde7994c8b45a0cc86b0
-
SHA512
eda19d6815f9dfee30e9333b33207c0094fa4a73ef933238b31a5fc067db4dc3d375425f62ed8eb9b983de4e80261196b249ef21e738e4dec3021b8be93c6118
-
SSDEEP
1536:ry6wokqNIAHx9jF2S3v/g+HCvWkN5joeKSPgiVfyyQcUXTfp:r3j5YqYiCvWmEiVayQnTfp
Static task
static1
Behavioral task
behavioral1
Sample
PO43100090.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
PO43100090.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
PO43100090.exe
-
Size
100KB
-
MD5
0c3aea58a6af617d1d46b1ea5adc82e9
-
SHA1
df0d846d1107b83474295f2ca36a59caa7233f94
-
SHA256
601ce180d21070382025b51f1e606c15b16b284a139468e540ea02d2039fa6d7
-
SHA512
3fd08c3f0caab1adb06b2bddeb001ce92f2cff983e8602d2b3ff1b54788016955fd684bb0f542c742819d795b58d944dbb00119d6ed6fed7411b5f9cb3cd5026
-
SSDEEP
1536:N2EFfzilnU6Ya9WjuN9L9FnCWL0EGfdM3CEF/7GmqbMY7usiY9hkarnoRxei3:NDYlx99Wjwc9i7GmCMY7pdkarYgC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-