General
-
Target
5a7d4c9d192a61051ed40b239e3d66c4
-
Size
922KB
-
Sample
240114-gyy2waecf3
-
MD5
5a7d4c9d192a61051ed40b239e3d66c4
-
SHA1
e76c75cf784089c3590969539afc0dfc89a8271f
-
SHA256
0a2d2b015b51c82e1d3861387ef2b7656193bd223411579ae7bc9e6b272b44d4
-
SHA512
1389d92cf189b89fde35e0bdf75482be6e811ccd822c45cb2697624b511d2d50de9ea1ddaeb91c91f867abae96b4021881ab847aedc242071396b35124e90a0e
-
SSDEEP
24576:4ORcwS/d3FtAK7OfIaPN/udPzk+j33IBK:jRc0K7OAe2dPgsY
Static task
static1
Behavioral task
behavioral1
Sample
5a7d4c9d192a61051ed40b239e3d66c4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a7d4c9d192a61051ed40b239e3d66c4.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.cpagrenada.org - Port:
587 - Username:
[email protected] - Password:
Accounts2017@CPA
Targets
-
-
Target
5a7d4c9d192a61051ed40b239e3d66c4
-
Size
922KB
-
MD5
5a7d4c9d192a61051ed40b239e3d66c4
-
SHA1
e76c75cf784089c3590969539afc0dfc89a8271f
-
SHA256
0a2d2b015b51c82e1d3861387ef2b7656193bd223411579ae7bc9e6b272b44d4
-
SHA512
1389d92cf189b89fde35e0bdf75482be6e811ccd822c45cb2697624b511d2d50de9ea1ddaeb91c91f867abae96b4021881ab847aedc242071396b35124e90a0e
-
SSDEEP
24576:4ORcwS/d3FtAK7OfIaPN/udPzk+j33IBK:jRc0K7OAe2dPgsY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-