General
-
Target
09b8bf9309936096907f5b509efbae7114ea6d7c33197b98000ce8c6abd5f7b5
-
Size
562KB
-
Sample
231212-cqzk8adcdj
-
MD5
f304d7b3be5b545fa344af558999a35d
-
SHA1
89fbc87364300507d70737b0a8f69fd7b3709ac0
-
SHA256
09b8bf9309936096907f5b509efbae7114ea6d7c33197b98000ce8c6abd5f7b5
-
SHA512
4a855d466c2860f73394a6aae9f23fa11b9b0d14e4cc5eeff28763c808f421a4b46d1b54b05d61b949fc05d0e9f1151b9a85f101821827fe50c76330ead91e70
-
SSDEEP
12288:KBgOWP6ilo7OnSmzCSYWLhn2JoGGPTtn9YVkKWIls1DtOdBg:KCggSHyN4ZmB953IK5tX
Static task
static1
Behavioral task
behavioral1
Sample
09b8bf9309936096907f5b509efbae7114ea6d7c33197b98000ce8c6abd5f7b5.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
09b8bf9309936096907f5b509efbae7114ea6d7c33197b98000ce8c6abd5f7b5.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
09b8bf9309936096907f5b509efbae7114ea6d7c33197b98000ce8c6abd5f7b5
-
Size
562KB
-
MD5
f304d7b3be5b545fa344af558999a35d
-
SHA1
89fbc87364300507d70737b0a8f69fd7b3709ac0
-
SHA256
09b8bf9309936096907f5b509efbae7114ea6d7c33197b98000ce8c6abd5f7b5
-
SHA512
4a855d466c2860f73394a6aae9f23fa11b9b0d14e4cc5eeff28763c808f421a4b46d1b54b05d61b949fc05d0e9f1151b9a85f101821827fe50c76330ead91e70
-
SSDEEP
12288:KBgOWP6ilo7OnSmzCSYWLhn2JoGGPTtn9YVkKWIls1DtOdBg:KCggSHyN4ZmB953IK5tX
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-