General
-
Target
1ce3c7ed002e94792d675475ceb4cf48
-
Size
892KB
-
Sample
231230-z889psdha8
-
MD5
1ce3c7ed002e94792d675475ceb4cf48
-
SHA1
a42f0ccdd803cb7b4a8ea05e46e7c012d7fe06f7
-
SHA256
f429388fb11aa0067f6e5927aaec48dd9d6c4c22893182961a7c6e5cc3648a79
-
SHA512
f4114a8141396c90822ed7488f8415beff3066afc4d0a6d7cf6df7d05d4e9195e091f45f24117efd0e7b9157889332cde972327b2a3175b6fb16aa526efd9881
-
SSDEEP
12288:UoMg9qlXpkRAkD0zsLrQmkc1DF2s6bogj4ydZlNBCfhWMN5fNnxKlfDb7b0wNZ9E:UoIoAg/LrQacs6boG4Wlv2W0NxKl7z0
Static task
static1
Behavioral task
behavioral1
Sample
1ce3c7ed002e94792d675475ceb4cf48.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ce3c7ed002e94792d675475ceb4cf48.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
serv-10708.handsonwebhosting.com - Port:
587 - Username:
[email protected] - Password:
icui4cu2@@
Targets
-
-
Target
1ce3c7ed002e94792d675475ceb4cf48
-
Size
892KB
-
MD5
1ce3c7ed002e94792d675475ceb4cf48
-
SHA1
a42f0ccdd803cb7b4a8ea05e46e7c012d7fe06f7
-
SHA256
f429388fb11aa0067f6e5927aaec48dd9d6c4c22893182961a7c6e5cc3648a79
-
SHA512
f4114a8141396c90822ed7488f8415beff3066afc4d0a6d7cf6df7d05d4e9195e091f45f24117efd0e7b9157889332cde972327b2a3175b6fb16aa526efd9881
-
SSDEEP
12288:UoMg9qlXpkRAkD0zsLrQmkc1DF2s6bogj4ydZlNBCfhWMN5fNnxKlfDb7b0wNZ9E:UoIoAg/LrQacs6boG4Wlv2W0NxKl7z0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-