General
-
Target
bd542f53bacf16c1dc43a78600866e28e56acb368606b0911a377ce3493148e0
-
Size
558KB
-
Sample
240112-bp7d1acaej
-
MD5
771aa6920f90319906d8a33751465124
-
SHA1
5eb7109c472072ae62d4c80fb12badbe1dca777a
-
SHA256
bd542f53bacf16c1dc43a78600866e28e56acb368606b0911a377ce3493148e0
-
SHA512
2febae72a010e4f41f0c4d856c9ed8a5275e1e343f9f45aeb869a8ff934b987201ee21bb4a49fba1fb502ae8b1af640f9b013cab79006945082d0744731965a2
-
SSDEEP
12288:1ecabmkw4QKREjbdFgR8ER8gGrAiP+nAIHQYmPzHD:YcKmJ4vREjbkR8ER2rdmmLH
Static task
static1
Behavioral task
behavioral1
Sample
bd542f53bacf16c1dc43a78600866e28e56acb368606b0911a377ce3493148e0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bd542f53bacf16c1dc43a78600866e28e56acb368606b0911a377ce3493148e0.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
bd542f53bacf16c1dc43a78600866e28e56acb368606b0911a377ce3493148e0
-
Size
558KB
-
MD5
771aa6920f90319906d8a33751465124
-
SHA1
5eb7109c472072ae62d4c80fb12badbe1dca777a
-
SHA256
bd542f53bacf16c1dc43a78600866e28e56acb368606b0911a377ce3493148e0
-
SHA512
2febae72a010e4f41f0c4d856c9ed8a5275e1e343f9f45aeb869a8ff934b987201ee21bb4a49fba1fb502ae8b1af640f9b013cab79006945082d0744731965a2
-
SSDEEP
12288:1ecabmkw4QKREjbdFgR8ER8gGrAiP+nAIHQYmPzHD:YcKmJ4vREjbkR8ER2rdmmLH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-