General
-
Target
3d9c4cb63e9d31d47d7d6b6aae90ad56.exe
-
Size
1.1MB
-
Sample
240101-yl8h8abdf4
-
MD5
3d9c4cb63e9d31d47d7d6b6aae90ad56
-
SHA1
bd96a4d2e0c24961b40d5f39a01723fdc3099951
-
SHA256
1865c272424b1d2d9dbcd757f6d03b61480748bc725df0040d25f32ebe5bfb0b
-
SHA512
f78e858cbfd16bf0a8ac526223a1a57a9249c406ef2e4642225e372aecd1247c6272c75f60ee8d05756aca1b5f6ed8c56e490a0175affb912e6dd4fcc05a838a
-
SSDEEP
24576:Io2A4dm5pR1rOCmwPLSqjE8zonvs/NJKaoT:XbvzR1rOCLLSqjPk8JKlT
Static task
static1
Behavioral task
behavioral1
Sample
3d9c4cb63e9d31d47d7d6b6aae90ad56.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d9c4cb63e9d31d47d7d6b6aae90ad56.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.vivaldi.net - Port:
587 - Username:
[email protected] - Password:
Codebreaker#007
Targets
-
-
Target
3d9c4cb63e9d31d47d7d6b6aae90ad56.exe
-
Size
1.1MB
-
MD5
3d9c4cb63e9d31d47d7d6b6aae90ad56
-
SHA1
bd96a4d2e0c24961b40d5f39a01723fdc3099951
-
SHA256
1865c272424b1d2d9dbcd757f6d03b61480748bc725df0040d25f32ebe5bfb0b
-
SHA512
f78e858cbfd16bf0a8ac526223a1a57a9249c406ef2e4642225e372aecd1247c6272c75f60ee8d05756aca1b5f6ed8c56e490a0175affb912e6dd4fcc05a838a
-
SSDEEP
24576:Io2A4dm5pR1rOCmwPLSqjE8zonvs/NJKaoT:XbvzR1rOCLLSqjPk8JKlT
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-