General
-
Target
4dfc3835f58f1cbdf52fbd10362339e5a2f6d7a7e618c70937898e236ff6511a
-
Size
1.2MB
-
Sample
231207-da27vaaed2
-
MD5
c9c254e7483a97ff8f984b71b01e4cc3
-
SHA1
7db8850c4ef74fc9134f1b0e97a3c9930e5fdadd
-
SHA256
4dfc3835f58f1cbdf52fbd10362339e5a2f6d7a7e618c70937898e236ff6511a
-
SHA512
7dc67a0f4491e3d68a1307d8f20cd2aaf37c592f3d90386ee6a8ab94f549c8dc5451a3f0cd1aef2f781800a66da281a9d979475862e814ec438877846b0f95de
-
SSDEEP
12288:le+QaueH5qUuRDIlaNOjAFXxCyA1582aGDW7/ntf2B6ogV:leiqUMI4NOjICZK/tf2o
Static task
static1
Behavioral task
behavioral1
Sample
70031MES.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
70031MES.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
70031MES.EXE
-
Size
565KB
-
MD5
b07419d2bf5fd6f6f75b47fd857c42ea
-
SHA1
a3df0a87d181a1c0912d4fe9e8848741688d6445
-
SHA256
3ca50b691c245e5d31ba80c101285ef26fc08c0ae5afcca3ab2b61b53dabec35
-
SHA512
7d5b779c3181bdfabdaab240e5ca4c0c47bfa3b0ee002f9aa5ec8e649ca7df95e878060985ca0ee18d035e9e1e482b7075f921ef86ed0acfb1871f2961578fb8
-
SSDEEP
12288:1e+QaueH5qUuRDIlaNOjAFXxCyA1582aGDW7/ntf2B6ogV:1eiqUMI4NOjICZK/tf2o
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-