General
-
Target
ffe30c4ac40f0e43147b0ffe6ede3e3f
-
Size
729KB
-
Sample
231228-3gb2nsefg5
-
MD5
ffe30c4ac40f0e43147b0ffe6ede3e3f
-
SHA1
bde322fd8135752b32f0301887e25295a08f2b44
-
SHA256
9f34067bfd42e0ddfff753c0e045a4a1df331d738ec6946ed35531f8cf33440b
-
SHA512
1e70a0a0fb23c88f49fc702127e4d826454d4406ebee05d07ef341283c57fb1e12094ce3c4fa54e328771366dadc0935bf15d20a0d585783c0afe0002c1d7b2c
-
SSDEEP
12288:rqZRCj+R1NCusiJrIL/st6cLA7RSAq+JdXOTNoRiRMYOodOrfUf2ntjjUS:eZtTIiugtZJ5od+TCRoJZdmUf2t/US
Static task
static1
Behavioral task
behavioral1
Sample
ffe30c4ac40f0e43147b0ffe6ede3e3f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ffe30c4ac40f0e43147b0ffe6ede3e3f.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.marcer.com.tr - Port:
587 - Username:
[email protected] - Password:
mar1453
Targets
-
-
Target
ffe30c4ac40f0e43147b0ffe6ede3e3f
-
Size
729KB
-
MD5
ffe30c4ac40f0e43147b0ffe6ede3e3f
-
SHA1
bde322fd8135752b32f0301887e25295a08f2b44
-
SHA256
9f34067bfd42e0ddfff753c0e045a4a1df331d738ec6946ed35531f8cf33440b
-
SHA512
1e70a0a0fb23c88f49fc702127e4d826454d4406ebee05d07ef341283c57fb1e12094ce3c4fa54e328771366dadc0935bf15d20a0d585783c0afe0002c1d7b2c
-
SSDEEP
12288:rqZRCj+R1NCusiJrIL/st6cLA7RSAq+JdXOTNoRiRMYOodOrfUf2ntjjUS:eZtTIiugtZJ5od+TCRoJZdmUf2t/US
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-