General
-
Target
72f32815fc88640697edd8f0b486ab86
-
Size
627KB
-
Sample
240124-1tebfshhb5
-
MD5
72f32815fc88640697edd8f0b486ab86
-
SHA1
64ad2f1e8e546bbc3cfcd9dbb7d0982e1bdbb6f7
-
SHA256
aac8a0cdb1ab05e98d76fb08a84471ff31bed65aeed4d7e19e57ed0c6714d439
-
SHA512
3f52a76ab1d23f3643d70a42ad26f3fe20b62c769ae62acc0e04ad11cdf45be8932400f2995ec769b9e5d067955b84a4a9c11e48dff31dbc8bfa0a10b7f95481
-
SSDEEP
12288:2l21aOsBgo0q4wMQo4LkFxEAODdvcBzIvwaCqhWOrkmOV0dW:2l21aOsBgo0q4wMQo4SOaIvwjqE6kB0d
Static task
static1
Behavioral task
behavioral1
Sample
72f32815fc88640697edd8f0b486ab86.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72f32815fc88640697edd8f0b486ab86.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.boikgold.com - Port:
587 - Username:
[email protected] - Password:
iskraines@2017
Targets
-
-
Target
72f32815fc88640697edd8f0b486ab86
-
Size
627KB
-
MD5
72f32815fc88640697edd8f0b486ab86
-
SHA1
64ad2f1e8e546bbc3cfcd9dbb7d0982e1bdbb6f7
-
SHA256
aac8a0cdb1ab05e98d76fb08a84471ff31bed65aeed4d7e19e57ed0c6714d439
-
SHA512
3f52a76ab1d23f3643d70a42ad26f3fe20b62c769ae62acc0e04ad11cdf45be8932400f2995ec769b9e5d067955b84a4a9c11e48dff31dbc8bfa0a10b7f95481
-
SSDEEP
12288:2l21aOsBgo0q4wMQo4LkFxEAODdvcBzIvwaCqhWOrkmOV0dW:2l21aOsBgo0q4wMQo4SOaIvwjqE6kB0d
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-