General
-
Target
77d6a60c699a7759aebd79d699d7f422
-
Size
2.2MB
-
Sample
240126-t1fpjahgd2
-
MD5
77d6a60c699a7759aebd79d699d7f422
-
SHA1
94a88f1d3df1ecc5242ebc588d4ef3e56edba9c4
-
SHA256
0729173071c96d8afc5b9e9b2034ef579c85dbaac6e59bf7f12ebaebbbbb5d37
-
SHA512
793214b5bba66417792734109cbce02a71d3cb1b4e3f18f94f433f5975f92b831ae3e61f4506b8789ce156c004b5bac379afcc5a31e25a8a9bee641625b2beda
-
SSDEEP
49152:4oh8rPf5W1hjfjt+rWbrnVi5cYkkOhCOByCtHPXltn9l/ulNUqr4J3aqusqDRn9J:4yafAn/trDVNf3E2/y0FORP
Behavioral task
behavioral1
Sample
77d6a60c699a7759aebd79d699d7f422.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
77d6a60c699a7759aebd79d699d7f422.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Great@12345
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Great@12345
Targets
-
-
Target
77d6a60c699a7759aebd79d699d7f422
-
Size
2.2MB
-
MD5
77d6a60c699a7759aebd79d699d7f422
-
SHA1
94a88f1d3df1ecc5242ebc588d4ef3e56edba9c4
-
SHA256
0729173071c96d8afc5b9e9b2034ef579c85dbaac6e59bf7f12ebaebbbbb5d37
-
SHA512
793214b5bba66417792734109cbce02a71d3cb1b4e3f18f94f433f5975f92b831ae3e61f4506b8789ce156c004b5bac379afcc5a31e25a8a9bee641625b2beda
-
SSDEEP
49152:4oh8rPf5W1hjfjt+rWbrnVi5cYkkOhCOByCtHPXltn9l/ulNUqr4J3aqusqDRn9J:4yafAn/trDVNf3E2/y0FORP
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-