General
-
Target
1f8a28e9eea19313c1d5453a4b292788
-
Size
497KB
-
Sample
231225-bkgb1shda9
-
MD5
1f8a28e9eea19313c1d5453a4b292788
-
SHA1
51e8b4e4f328bd95d05a783bc953d720d10ea3d1
-
SHA256
f465787fcece594aab905f5b32772c2125fbaebc2dd0c27ab1117e2056648e0f
-
SHA512
a455fcd1a516cde545bbd0e23651188c955f92673ccdb1106ea8c862f454af089746e7fc7712808ada591a2f575400b753caca018c82b956b20cef17850483a0
-
SSDEEP
6144:arDaY05qwyS6SmNMqt6snMU8Jj/QydRqB2imKOyI6jTvlyTQmocbx3NVvNJI2fr/:6IUFS6Smt7r2j/QxklEAEaVVJbLWe
Static task
static1
Behavioral task
behavioral1
Sample
1f8a28e9eea19313c1d5453a4b292788.exe
Resource
win7-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.jetport-aero.com - Port:
587 - Username:
[email protected] - Password:
Niniola@456
Targets
-
-
Target
1f8a28e9eea19313c1d5453a4b292788
-
Size
497KB
-
MD5
1f8a28e9eea19313c1d5453a4b292788
-
SHA1
51e8b4e4f328bd95d05a783bc953d720d10ea3d1
-
SHA256
f465787fcece594aab905f5b32772c2125fbaebc2dd0c27ab1117e2056648e0f
-
SHA512
a455fcd1a516cde545bbd0e23651188c955f92673ccdb1106ea8c862f454af089746e7fc7712808ada591a2f575400b753caca018c82b956b20cef17850483a0
-
SSDEEP
6144:arDaY05qwyS6SmNMqt6snMU8Jj/QydRqB2imKOyI6jTvlyTQmocbx3NVvNJI2fr/:6IUFS6Smt7r2j/QxklEAEaVVJbLWe
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Modifies WinLogon for persistence
-
AgentTesla payload
-
Suspicious use of SetThreadContext
-