General
-
Target
171c3cebf6a3f2532e73c3f2e20cac4a.exe
-
Size
666KB
-
Sample
240102-s43g2aghcq
-
MD5
171c3cebf6a3f2532e73c3f2e20cac4a
-
SHA1
9e8bcb302d846b16f6721a2198c270d1efa69b85
-
SHA256
5dc41425af32e771e1146c073aeed6b5a5ed326b621970f94c78cc8b80872de0
-
SHA512
7220981399dcccc94b55788f45ec41b44b350a9cad1046d1cbfc0ac5eda4f24295b5dedc890ef6c95c7671296e9e42d80be073a9d48bb50ac1209657e3a2ee16
-
SSDEEP
12288:jvjM502iNv4s8fE7qdw87eo3bm2pMlCPxVlIH0JyP5:TU01usjqdw87xbdx4UY
Static task
static1
Behavioral task
behavioral1
Sample
171c3cebf6a3f2532e73c3f2e20cac4a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
171c3cebf6a3f2532e73c3f2e20cac4a.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.1und1.de - Port:
587 - Username:
[email protected] - Password:
amazon104b - Email To:
[email protected]
Targets
-
-
Target
171c3cebf6a3f2532e73c3f2e20cac4a.exe
-
Size
666KB
-
MD5
171c3cebf6a3f2532e73c3f2e20cac4a
-
SHA1
9e8bcb302d846b16f6721a2198c270d1efa69b85
-
SHA256
5dc41425af32e771e1146c073aeed6b5a5ed326b621970f94c78cc8b80872de0
-
SHA512
7220981399dcccc94b55788f45ec41b44b350a9cad1046d1cbfc0ac5eda4f24295b5dedc890ef6c95c7671296e9e42d80be073a9d48bb50ac1209657e3a2ee16
-
SSDEEP
12288:jvjM502iNv4s8fE7qdw87eo3bm2pMlCPxVlIH0JyP5:TU01usjqdw87xbdx4UY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-