General
-
Target
259206e6fbda6b46e6499e518adcaf96
-
Size
613KB
-
Sample
231231-djh6bsdcfq
-
MD5
259206e6fbda6b46e6499e518adcaf96
-
SHA1
3c2a4bb622685d3e250d4566d25aa244e18f0086
-
SHA256
fed60d381e993a084cbde0147f445309d00a69b6be01aeebace31acdb424a91f
-
SHA512
9f2d873a853ed0494cb7326286c0dd2e338b5422ecbd221f9bda831a205953ece096e297c248a89f477f7e89755b204ab7181fb2c991df489e3270b62aa42c6f
-
SSDEEP
12288:H12OsBgo0q4wM/VkGjkfoX89JrFM02XweWFdPcYiQAqwQikKCTwE47:4OsBgo0q4wM2ykfosfriwPFdPKQAqwMn
Static task
static1
Behavioral task
behavioral1
Sample
259206e6fbda6b46e6499e518adcaf96.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
259206e6fbda6b46e6499e518adcaf96.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ggraco.com - Port:
587 - Username:
[email protected] - Password:
admin@#1235
Targets
-
-
Target
259206e6fbda6b46e6499e518adcaf96
-
Size
613KB
-
MD5
259206e6fbda6b46e6499e518adcaf96
-
SHA1
3c2a4bb622685d3e250d4566d25aa244e18f0086
-
SHA256
fed60d381e993a084cbde0147f445309d00a69b6be01aeebace31acdb424a91f
-
SHA512
9f2d873a853ed0494cb7326286c0dd2e338b5422ecbd221f9bda831a205953ece096e297c248a89f477f7e89755b204ab7181fb2c991df489e3270b62aa42c6f
-
SSDEEP
12288:H12OsBgo0q4wM/VkGjkfoX89JrFM02XweWFdPcYiQAqwQikKCTwE47:4OsBgo0q4wM2ykfosfriwPFdPKQAqwMn
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-