General
-
Target
9c5c25534452390522f00bd000ccef1275b398f83e60edd5c1243cd0666e8406.exe
-
Size
542KB
-
Sample
231202-jd756aae58
-
MD5
b920f99b699f1a640e5eb338d99a22a0
-
SHA1
a0802977c31297b5f654c7ad62cd4930bab6414a
-
SHA256
9c5c25534452390522f00bd000ccef1275b398f83e60edd5c1243cd0666e8406
-
SHA512
a487b5cdd713a3da380aa455e6f944dd97ad4ebaae126c40987e0fbe103a2c01f4f3c567e52e4a334a6ace128b43dd93bbdeeff33cefe57a33f34b11b2d55270
-
SSDEEP
12288:CqfLYYZXTyPAlv+yUCaj91PwKfOYBu9sBtsX7lMIg5SvdT:xXT0AlvLUHPF/+hM9Sv
Static task
static1
Behavioral task
behavioral1
Sample
9c5c25534452390522f00bd000ccef1275b398f83e60edd5c1243cd0666e8406.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
9c5c25534452390522f00bd000ccef1275b398f83e60edd5c1243cd0666e8406.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
9c5c25534452390522f00bd000ccef1275b398f83e60edd5c1243cd0666e8406.exe
-
Size
542KB
-
MD5
b920f99b699f1a640e5eb338d99a22a0
-
SHA1
a0802977c31297b5f654c7ad62cd4930bab6414a
-
SHA256
9c5c25534452390522f00bd000ccef1275b398f83e60edd5c1243cd0666e8406
-
SHA512
a487b5cdd713a3da380aa455e6f944dd97ad4ebaae126c40987e0fbe103a2c01f4f3c567e52e4a334a6ace128b43dd93bbdeeff33cefe57a33f34b11b2d55270
-
SSDEEP
12288:CqfLYYZXTyPAlv+yUCaj91PwKfOYBu9sBtsX7lMIg5SvdT:xXT0AlvLUHPF/+hM9Sv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-