General
-
Target
4446d1f062cab8dc96e1acd4b96b609b
-
Size
819KB
-
Sample
240105-ydkgeshdbl
-
MD5
4446d1f062cab8dc96e1acd4b96b609b
-
SHA1
f57863b9d4b8c551c823f0e9c114e21fd4f58942
-
SHA256
b3c30689d3b12f79f23a67d02f5f7537898193af6d456d53805ece8115163ecd
-
SHA512
72eb344848b0cfb225f61f737eaefee40288eab119db481150cab6fa4fb4feabafd62994b7f25a8dbc1d714dc7aab90c06129ef9bc23006c8605e9db4e8f573c
-
SSDEEP
12288:7/jGQA6ZUoR65AXwgFvuSS3II5u+kUTvyQ15xCiCkCtwsTSbap426UAveHltzCQw:GoR6qgx164CiCzhm245UJDCP
Static task
static1
Behavioral task
behavioral1
Sample
4446d1f062cab8dc96e1acd4b96b609b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4446d1f062cab8dc96e1acd4b96b609b.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server1.ahost.uz - Port:
587 - Username:
[email protected] - Password:
f#sLN-Dh.6G7
Targets
-
-
Target
4446d1f062cab8dc96e1acd4b96b609b
-
Size
819KB
-
MD5
4446d1f062cab8dc96e1acd4b96b609b
-
SHA1
f57863b9d4b8c551c823f0e9c114e21fd4f58942
-
SHA256
b3c30689d3b12f79f23a67d02f5f7537898193af6d456d53805ece8115163ecd
-
SHA512
72eb344848b0cfb225f61f737eaefee40288eab119db481150cab6fa4fb4feabafd62994b7f25a8dbc1d714dc7aab90c06129ef9bc23006c8605e9db4e8f573c
-
SSDEEP
12288:7/jGQA6ZUoR65AXwgFvuSS3II5u+kUTvyQ15xCiCkCtwsTSbap426UAveHltzCQw:GoR6qgx164CiCzhm245UJDCP
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-