General
-
Target
7e4e23d4602c380e31d9b7df4926a9e6.bin
-
Size
609KB
-
Sample
231220-c7f57sgggl
-
MD5
ba0724c20e1b86762c5182231da90f4e
-
SHA1
7d81faf048f511b2d87ff8c1482c4dc94aa25534
-
SHA256
55b5275d116f26d65b9034f8a20741bd33de6de6b5073b5f37a6ec1cd45a12e5
-
SHA512
27af6ce8f2d82046fb104c6ef5465bb07e5ef5b42b0c731d0a99b89c308ed533b90dc6d8543b4405872e733bffa28bbd6e539ad94c849890bbbc5339cfb7d907
-
SSDEEP
12288:OrZfuctJFqZjBkVFJ5pfVzTUx4uzqKJ1u0:OrZfuo4jGJyx560
Static task
static1
Behavioral task
behavioral1
Sample
21a19482c7a1a678d0797850431815d7778aaf3c76218e154cd36f13062e378a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21a19482c7a1a678d0797850431815d7778aaf3c76218e154cd36f13062e378a.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
21a19482c7a1a678d0797850431815d7778aaf3c76218e154cd36f13062e378a.exe
-
Size
844KB
-
MD5
7e4e23d4602c380e31d9b7df4926a9e6
-
SHA1
c307c39832a51b5d271230ef5456ef1b1b31b756
-
SHA256
21a19482c7a1a678d0797850431815d7778aaf3c76218e154cd36f13062e378a
-
SHA512
54c80b31c48568530ce2b15c83921a3210f72e56d0c8ac6e69b3631fddd48ff03d0bcf4ce91e008bc53f4912ba67806e86495f42e7edc7f963c04db292b6295c
-
SSDEEP
12288:QTwEx2iNE2xVzAEctO70Zty1iZRJi/AR8Yl2mCwypoyiF0YvC:0wk1OqzAjvZtyyJgM8m2IRiYvC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-