General
-
Target
PO 3345.exe
-
Size
663KB
-
Sample
231201-jvzv4sga56
-
MD5
16a97a92f7072068c9345f16c1b841b3
-
SHA1
42dda412b6af64273d1e55ae3008ca03fcf0072a
-
SHA256
c705dadf9dc655839e0778f2b05e191f41c58d288420095131fe2153e0cd9334
-
SHA512
100c7c8f3a95b21ca1f408b7a2e879ace27ace6394774ebd2c9a97c7ef47d75191ed191af083e014b264bf2da0b0c68e8448e043c920788dc234e41360ed66c4
-
SSDEEP
12288:HriSAx5PWPQA4jcCxttjSUXcM+UxhCuJ8JBCu5XHxrHdm5OznueAWt6G4enCG0m:Hr7Ax5uPH4jcCzBjJJ8/n3tHdm5OznuW
Static task
static1
Behavioral task
behavioral1
Sample
PO 3345.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
PO 3345.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rmmarine.com.sg - Port:
587 - Username:
[email protected] - Password:
Rmms201809 - Email To:
[email protected]
Targets
-
-
Target
PO 3345.exe
-
Size
663KB
-
MD5
16a97a92f7072068c9345f16c1b841b3
-
SHA1
42dda412b6af64273d1e55ae3008ca03fcf0072a
-
SHA256
c705dadf9dc655839e0778f2b05e191f41c58d288420095131fe2153e0cd9334
-
SHA512
100c7c8f3a95b21ca1f408b7a2e879ace27ace6394774ebd2c9a97c7ef47d75191ed191af083e014b264bf2da0b0c68e8448e043c920788dc234e41360ed66c4
-
SSDEEP
12288:HriSAx5PWPQA4jcCxttjSUXcM+UxhCuJ8JBCu5XHxrHdm5OznueAWt6G4enCG0m:Hr7Ax5uPH4jcCzBjJJ8/n3tHdm5OznuW
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-