General
-
Target
7aa3f456550482e7bda6a02528ac9810
-
Size
651KB
-
Sample
240127-s7rjyahaak
-
MD5
7aa3f456550482e7bda6a02528ac9810
-
SHA1
1abd3b6a868e4af96fdecea6d24d18c504cd53e8
-
SHA256
4257668544f82471d6be72eca158de2d80011072ba2954b06fbae4ff6a71b4d2
-
SHA512
47a21e70c4346f4518aa976870bad9f63044b11b8cdc792740399415ea76e099b2692c10dbcfd4d95da222b58945fc7c897301d789154b82d68041cf33e018f1
-
SSDEEP
12288:IeZh0joFiZfb46r1z9FNWQF0kNNDWciU0:I7o+TdfbWQykNO
Static task
static1
Behavioral task
behavioral1
Sample
7aa3f456550482e7bda6a02528ac9810.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7aa3f456550482e7bda6a02528ac9810.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.onurtriko.com.tr - Port:
587 - Username:
[email protected] - Password:
Ee980502+E
Targets
-
-
Target
7aa3f456550482e7bda6a02528ac9810
-
Size
651KB
-
MD5
7aa3f456550482e7bda6a02528ac9810
-
SHA1
1abd3b6a868e4af96fdecea6d24d18c504cd53e8
-
SHA256
4257668544f82471d6be72eca158de2d80011072ba2954b06fbae4ff6a71b4d2
-
SHA512
47a21e70c4346f4518aa976870bad9f63044b11b8cdc792740399415ea76e099b2692c10dbcfd4d95da222b58945fc7c897301d789154b82d68041cf33e018f1
-
SSDEEP
12288:IeZh0joFiZfb46r1z9FNWQF0kNNDWciU0:I7o+TdfbWQykNO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-