General
-
Target
c1333252ecbfb02c0987b32e9b8dfe1d
-
Size
1.5MB
-
Sample
240311-v7w6jabf74
-
MD5
c1333252ecbfb02c0987b32e9b8dfe1d
-
SHA1
22fdd57439f0f40be3ae26e223706f363d448d21
-
SHA256
fe53ffe55e2681c889f0ef442a6a75d18a5a445e41cfd6c8cdfaebb7ab49909a
-
SHA512
5b63e15ffc5ce939c239e5ce4da415ef835f7503bc67792f4f3f8ef8e47d2bd9e5bedf00f32d981e040488acc7cee4e0fd0d84cd0263aea64b6595d586b8dead
-
SSDEEP
24576:7Yci8Dgh24pfGjCaKD9Ra4v2z5B6EOZZS5R0:7e8kh24QWaK/aDz58EO3B
Static task
static1
Behavioral task
behavioral1
Sample
c1333252ecbfb02c0987b32e9b8dfe1d.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c1333252ecbfb02c0987b32e9b8dfe1d.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.epaindemgroup.com - Port:
587 - Username:
[email protected] - Password:
uur0bhYc
Targets
-
-
Target
c1333252ecbfb02c0987b32e9b8dfe1d
-
Size
1.5MB
-
MD5
c1333252ecbfb02c0987b32e9b8dfe1d
-
SHA1
22fdd57439f0f40be3ae26e223706f363d448d21
-
SHA256
fe53ffe55e2681c889f0ef442a6a75d18a5a445e41cfd6c8cdfaebb7ab49909a
-
SHA512
5b63e15ffc5ce939c239e5ce4da415ef835f7503bc67792f4f3f8ef8e47d2bd9e5bedf00f32d981e040488acc7cee4e0fd0d84cd0263aea64b6595d586b8dead
-
SSDEEP
24576:7Yci8Dgh24pfGjCaKD9Ra4v2z5B6EOZZS5R0:7e8kh24QWaK/aDz58EO3B
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-