General
-
Target
c2755f96ce4a2d006b13a7ec453d3b7f
-
Size
882KB
-
Sample
240312-e7ch5aad75
-
MD5
c2755f96ce4a2d006b13a7ec453d3b7f
-
SHA1
54722c12f80d622565095766d494c3fbe111f8ca
-
SHA256
d8931e5d7a8cf4c6a8956b891ae8bddf6f5c0f7f525a89798dbc220262956407
-
SHA512
e136e5f6b690f7a293e621660e30b16a219abefa3d5b4ced08fe6e3ca8dac36c96b7fad444b0081f48bbf57b52203788e66f8e0b9be38d6e347685cd8ef56fdd
-
SSDEEP
24576:wjKcPp9AR95ykHaSX9v7/XEe4pjv89Dwcw:OPpKRyTSNbCjmDwc
Static task
static1
Behavioral task
behavioral1
Sample
c2755f96ce4a2d006b13a7ec453d3b7f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2755f96ce4a2d006b13a7ec453d3b7f.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.brimaq.com - Port:
587 - Username:
[email protected] - Password:
brimaQ2012 - Email To:
[email protected]
Targets
-
-
Target
c2755f96ce4a2d006b13a7ec453d3b7f
-
Size
882KB
-
MD5
c2755f96ce4a2d006b13a7ec453d3b7f
-
SHA1
54722c12f80d622565095766d494c3fbe111f8ca
-
SHA256
d8931e5d7a8cf4c6a8956b891ae8bddf6f5c0f7f525a89798dbc220262956407
-
SHA512
e136e5f6b690f7a293e621660e30b16a219abefa3d5b4ced08fe6e3ca8dac36c96b7fad444b0081f48bbf57b52203788e66f8e0b9be38d6e347685cd8ef56fdd
-
SSDEEP
24576:wjKcPp9AR95ykHaSX9v7/XEe4pjv89Dwcw:OPpKRyTSNbCjmDwc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-