General
-
Target
c27416bf42c21f536df09f8fa31eade8
-
Size
614KB
-
Sample
240312-e5jjnaad35
-
MD5
c27416bf42c21f536df09f8fa31eade8
-
SHA1
520ccc18455dd84c64e93501bf9291499321bf43
-
SHA256
90c016c8affd8f058d6f190169aad49f6394cdf444aad8c0abc350df6553d447
-
SHA512
4ea3dbe14919d681c7d9b619bd130a2316f903ea97c43a7d973565f349f7bdd3c0946baa4c9f6fa61072c5748c518ea5d8be7e7fa8b4d189923a6d56f3c3f818
-
SSDEEP
12288:JG+mycGFINRA9isTmfxqAKsGHncjEL1j16u9HPFi7rWGf+Vr7GnpVLZHuEQigHT/:JGNaILwis6tKzcjs
Static task
static1
Behavioral task
behavioral1
Sample
c27416bf42c21f536df09f8fa31eade8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c27416bf42c21f536df09f8fa31eade8.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.melstar.in - Port:
587 - Username:
[email protected] - Password:
natraj1978_24
Targets
-
-
Target
c27416bf42c21f536df09f8fa31eade8
-
Size
614KB
-
MD5
c27416bf42c21f536df09f8fa31eade8
-
SHA1
520ccc18455dd84c64e93501bf9291499321bf43
-
SHA256
90c016c8affd8f058d6f190169aad49f6394cdf444aad8c0abc350df6553d447
-
SHA512
4ea3dbe14919d681c7d9b619bd130a2316f903ea97c43a7d973565f349f7bdd3c0946baa4c9f6fa61072c5748c518ea5d8be7e7fa8b4d189923a6d56f3c3f818
-
SSDEEP
12288:JG+mycGFINRA9isTmfxqAKsGHncjEL1j16u9HPFi7rWGf+Vr7GnpVLZHuEQigHT/:JGNaILwis6tKzcjs
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-