General
-
Target
bb6e3f99be7215c2afe4de4e80805ddb
-
Size
539KB
-
Sample
240308-q7vv9agf48
-
MD5
bb6e3f99be7215c2afe4de4e80805ddb
-
SHA1
5409cd1c457f429457ef0600d737517bc6b2889d
-
SHA256
c38e74eaaa19fef449a03e7852599a05c831fb844813e9b0b32d7f1f73fd1fac
-
SHA512
5174c5743415349a245c4a6535ec51c8a64fa18a7a48a4a9f8b09927b72834b1bfc1f51338bd8b22a5e640c4313c2094e1b51fc6de48775597b82c69302946c2
-
SSDEEP
12288:FB6UYWgdwcqM44a5W8vHfb4JyEOc5lBT/D:FBHzcqfJfbzVc5lV/D
Static task
static1
Behavioral task
behavioral1
Sample
bb6e3f99be7215c2afe4de4e80805ddb.exe
Resource
win7-20231129-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
newbeginning
Targets
-
-
Target
bb6e3f99be7215c2afe4de4e80805ddb
-
Size
539KB
-
MD5
bb6e3f99be7215c2afe4de4e80805ddb
-
SHA1
5409cd1c457f429457ef0600d737517bc6b2889d
-
SHA256
c38e74eaaa19fef449a03e7852599a05c831fb844813e9b0b32d7f1f73fd1fac
-
SHA512
5174c5743415349a245c4a6535ec51c8a64fa18a7a48a4a9f8b09927b72834b1bfc1f51338bd8b22a5e640c4313c2094e1b51fc6de48775597b82c69302946c2
-
SSDEEP
12288:FB6UYWgdwcqM44a5W8vHfb4JyEOc5lBT/D:FBHzcqfJfbzVc5lV/D
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-