General
-
Target
ee724d3cdfb0edeeb3ad16c7c88ae935b7b019b2a49395e6c8b31962177a9cf0
-
Size
701KB
-
Sample
231206-c71vlsad87
-
MD5
c6952f3ce2061453df4b3a7094629e20
-
SHA1
85b64ee012d5d5949c2a514282e520602d6ff464
-
SHA256
ee724d3cdfb0edeeb3ad16c7c88ae935b7b019b2a49395e6c8b31962177a9cf0
-
SHA512
f1d1fb2edadcd23fcfd4e68dc4fd06d50af7d1ad16000c27694e82196d62d4f0446fc34d0f716d9882be2b5c620d50d72a99cba36db723b484ad129617c79fd5
-
SSDEEP
12288:nnX5nF8ME6jD/MxvN6TXgY0Z7++Dc3nwG4JKM9lJqFxyv+fLuL2s:nXPtD/Mxo0dBX7Sxb0
Static task
static1
Behavioral task
behavioral1
Sample
ee724d3cdfb0edeeb3ad16c7c88ae935b7b019b2a49395e6c8b31962177a9cf0.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
ee724d3cdfb0edeeb3ad16c7c88ae935b7b019b2a49395e6c8b31962177a9cf0.exe
Resource
win10v2004-20231201-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.obynnehhhan.com - Port:
587 - Username:
[email protected] - Password:
G$MUuYG3
Targets
-
-
Target
ee724d3cdfb0edeeb3ad16c7c88ae935b7b019b2a49395e6c8b31962177a9cf0
-
Size
701KB
-
MD5
c6952f3ce2061453df4b3a7094629e20
-
SHA1
85b64ee012d5d5949c2a514282e520602d6ff464
-
SHA256
ee724d3cdfb0edeeb3ad16c7c88ae935b7b019b2a49395e6c8b31962177a9cf0
-
SHA512
f1d1fb2edadcd23fcfd4e68dc4fd06d50af7d1ad16000c27694e82196d62d4f0446fc34d0f716d9882be2b5c620d50d72a99cba36db723b484ad129617c79fd5
-
SSDEEP
12288:nnX5nF8ME6jD/MxvN6TXgY0Z7++Dc3nwG4JKM9lJqFxyv+fLuL2s:nXPtD/Mxo0dBX7Sxb0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-