General
-
Target
0a2dd7c7f33945c9f8d0d572fdea8eb4
-
Size
737KB
-
Sample
231230-byme7abahp
-
MD5
0a2dd7c7f33945c9f8d0d572fdea8eb4
-
SHA1
35eedbf87d0db7f098c164fa2dfd648023ea5ea8
-
SHA256
c0351986edde88da74cc051c26fee9466569d49773c0984439d544037341bb6c
-
SHA512
00622f3750d78d9197ba87b8578ebb38bb63fe6e6429cc75231b2230046c648ba2f2c3f6ab6d21f6898a767d05aa8595d6aa37d53de51b32e02c82078b006b42
-
SSDEEP
12288:mWc8Gpwi9AmfOechFXzBrRLoWMYdQQKlhTBXjp5wB2SzrBwVsJgD:O8INfgjxR3d/K7
Static task
static1
Behavioral task
behavioral1
Sample
0a2dd7c7f33945c9f8d0d572fdea8eb4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a2dd7c7f33945c9f8d0d572fdea8eb4.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.almuntakhaba.com - Port:
587 - Username:
[email protected] - Password:
amite123
Targets
-
-
Target
0a2dd7c7f33945c9f8d0d572fdea8eb4
-
Size
737KB
-
MD5
0a2dd7c7f33945c9f8d0d572fdea8eb4
-
SHA1
35eedbf87d0db7f098c164fa2dfd648023ea5ea8
-
SHA256
c0351986edde88da74cc051c26fee9466569d49773c0984439d544037341bb6c
-
SHA512
00622f3750d78d9197ba87b8578ebb38bb63fe6e6429cc75231b2230046c648ba2f2c3f6ab6d21f6898a767d05aa8595d6aa37d53de51b32e02c82078b006b42
-
SSDEEP
12288:mWc8Gpwi9AmfOechFXzBrRLoWMYdQQKlhTBXjp5wB2SzrBwVsJgD:O8INfgjxR3d/K7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-