General
-
Target
09232f5cc87ff4ea6ab50d53518a4b92
-
Size
383KB
-
Sample
231230-a76prafcd5
-
MD5
09232f5cc87ff4ea6ab50d53518a4b92
-
SHA1
f0f2ca1009a6b7e186de348982a789ddbcdca75c
-
SHA256
7456653bbef593df12c486704a8191338996e7fd84042b6f799881294a569ff4
-
SHA512
ca3b8f19c4b89a01fce49d26bace827fb32c46483357807c4873f6714276c19c550fb7a6435fe25e887085ab39c26a6e5a3f4778a7468f76a0339e2d039b436d
-
SSDEEP
6144:lbHcJieaB7jiR7YC3JnVmSM+l2ePIPPxUmWoFgvwIn6lawhO+v1Gj0K8E68G:pEhQihfRVMc2wIRUm+4InEZcjv
Static task
static1
Behavioral task
behavioral1
Sample
09232f5cc87ff4ea6ab50d53518a4b92.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09232f5cc87ff4ea6ab50d53518a4b92.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.nec-eg.com - Port:
587 - Username:
[email protected] - Password:
SALES5@2020nec
Targets
-
-
Target
09232f5cc87ff4ea6ab50d53518a4b92
-
Size
383KB
-
MD5
09232f5cc87ff4ea6ab50d53518a4b92
-
SHA1
f0f2ca1009a6b7e186de348982a789ddbcdca75c
-
SHA256
7456653bbef593df12c486704a8191338996e7fd84042b6f799881294a569ff4
-
SHA512
ca3b8f19c4b89a01fce49d26bace827fb32c46483357807c4873f6714276c19c550fb7a6435fe25e887085ab39c26a6e5a3f4778a7468f76a0339e2d039b436d
-
SSDEEP
6144:lbHcJieaB7jiR7YC3JnVmSM+l2ePIPPxUmWoFgvwIn6lawhO+v1Gj0K8E68G:pEhQihfRVMc2wIRUm+4InEZcjv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-