General
-
Target
1d15b950585afb67e29aaccd786e73cc
-
Size
1.3MB
-
Sample
231230-1dgfwaegg3
-
MD5
1d15b950585afb67e29aaccd786e73cc
-
SHA1
407c97da82309cdb81da1cc839f1d9c49ab5169e
-
SHA256
8078c7e3b89bfcf0eca7583b3a0509bddc7c83b6aeee05a81262946f5c011ca8
-
SHA512
9b9f3b90782dc36d668177e5beb9fbf528c3d1d391395f7d8135fbe1b8a078fc01aa710d20d7b6a61822b79b9d33b8f9afa72324cca9a9408c52a7cc76f87bd8
-
SSDEEP
24576:8y2Avjs89eOKTtr7zSOCW3LtXRLPT1zi/3BrmMnfk/iQ2+S0d:8mvjsaeOUtXuOZbB1PTxip9fk/Pj
Static task
static1
Behavioral task
behavioral1
Sample
1d15b950585afb67e29aaccd786e73cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d15b950585afb67e29aaccd786e73cc.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
bh-16.webhostbox.net - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
1d15b950585afb67e29aaccd786e73cc
-
Size
1.3MB
-
MD5
1d15b950585afb67e29aaccd786e73cc
-
SHA1
407c97da82309cdb81da1cc839f1d9c49ab5169e
-
SHA256
8078c7e3b89bfcf0eca7583b3a0509bddc7c83b6aeee05a81262946f5c011ca8
-
SHA512
9b9f3b90782dc36d668177e5beb9fbf528c3d1d391395f7d8135fbe1b8a078fc01aa710d20d7b6a61822b79b9d33b8f9afa72324cca9a9408c52a7cc76f87bd8
-
SSDEEP
24576:8y2Avjs89eOKTtr7zSOCW3LtXRLPT1zi/3BrmMnfk/iQ2+S0d:8mvjsaeOUtXuOZbB1PTxip9fk/Pj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-