General
-
Target
27786e9dc2494ab9d742775549d4c20f2c9107967b4693769c8138cc4a8636ae
-
Size
337KB
-
Sample
231208-crb7baaa4z
-
MD5
921f4b1ed09edcb9adf7de4234fa8b9f
-
SHA1
75c915cd09559c102fd980e19bf81574555764d3
-
SHA256
27786e9dc2494ab9d742775549d4c20f2c9107967b4693769c8138cc4a8636ae
-
SHA512
c3b067ca0ff4a60a4afc429df32e6297e00ed7d82df92bb62b51876d963dbe25761c747960e4c923a1da849cb70a8e8abb6851accead3ccf58dbe400905a4b00
-
SSDEEP
6144:YEfHpoXloiIXD/999ZMPLfDDMmGYWM+xYZrqyKuXzn2UsWYEMlh:YEvpoKz/9vZMPPDXGYWM+xKrUuDn2vv
Static task
static1
Behavioral task
behavioral1
Sample
27786e9dc2494ab9d742775549d4c20f2c9107967b4693769c8138cc4a8636ae.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
27786e9dc2494ab9d742775549d4c20f2c9107967b4693769c8138cc4a8636ae.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
198.23.221.13 - Port:
587 - Username:
[email protected] - Password:
admin2 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
198.23.221.13 - Port:
587 - Username:
[email protected] - Password:
admin2
Targets
-
-
Target
27786e9dc2494ab9d742775549d4c20f2c9107967b4693769c8138cc4a8636ae
-
Size
337KB
-
MD5
921f4b1ed09edcb9adf7de4234fa8b9f
-
SHA1
75c915cd09559c102fd980e19bf81574555764d3
-
SHA256
27786e9dc2494ab9d742775549d4c20f2c9107967b4693769c8138cc4a8636ae
-
SHA512
c3b067ca0ff4a60a4afc429df32e6297e00ed7d82df92bb62b51876d963dbe25761c747960e4c923a1da849cb70a8e8abb6851accead3ccf58dbe400905a4b00
-
SSDEEP
6144:YEfHpoXloiIXD/999ZMPLfDDMmGYWM+xYZrqyKuXzn2UsWYEMlh:YEvpoKz/9vZMPPDXGYWM+xKrUuDn2vv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-