General
-
Target
69fe97255c127e68a214693a19c72125
-
Size
855KB
-
Sample
231222-fjjszafccl
-
MD5
69fe97255c127e68a214693a19c72125
-
SHA1
061254bbea53a9c0325cfa596d0a3e53e79b82f8
-
SHA256
eeb62d009f6218f682660a9b3e30a9af0d493102aff9d697b24212d83fdddf46
-
SHA512
c643eab676aed1a9c5d88a7d1a3a186eb5775bbc16f0fd2d1551f71d56387eef0f37b20a6fceb38d593eb13205a1aea86fbd49987172d463732d2f225da951a3
-
SSDEEP
12288:CLmwXrT4E9fB9XAHsZnxAE89SnpVQc8Ts0TcK7G1R155wLrNDxsMNpJyEhYMueHY:3ynxwy6EQsFJ0AKA1X2NGq+4ICcNYk
Static task
static1
Behavioral task
behavioral1
Sample
69fe97255c127e68a214693a19c72125.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
69fe97255c127e68a214693a19c72125.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.moseg.com.mx - Port:
587 - Username:
[email protected] - Password:
Enero2019@
Targets
-
-
Target
69fe97255c127e68a214693a19c72125
-
Size
855KB
-
MD5
69fe97255c127e68a214693a19c72125
-
SHA1
061254bbea53a9c0325cfa596d0a3e53e79b82f8
-
SHA256
eeb62d009f6218f682660a9b3e30a9af0d493102aff9d697b24212d83fdddf46
-
SHA512
c643eab676aed1a9c5d88a7d1a3a186eb5775bbc16f0fd2d1551f71d56387eef0f37b20a6fceb38d593eb13205a1aea86fbd49987172d463732d2f225da951a3
-
SSDEEP
12288:CLmwXrT4E9fB9XAHsZnxAE89SnpVQc8Ts0TcK7G1R155wLrNDxsMNpJyEhYMueHY:3ynxwy6EQsFJ0AKA1X2NGq+4ICcNYk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-