General
-
Target
c86c9b4751f88f925a32ae8b399f2017
-
Size
892KB
-
Sample
240314-msn8dahh8z
-
MD5
c86c9b4751f88f925a32ae8b399f2017
-
SHA1
2481062c82c1eb0e9af9d126ff41f1594c0cf782
-
SHA256
be725585e6ae2724abda2d338b40b4c39da0b712126da103408e4da844e1f6fa
-
SHA512
fe1a6acd38111b7cb6d7ba45b060d40bdf499372f31522b3fe99d61a5edab818e5e1fde4151fd355f44c4f5568a2f78ca3edc4398a743d0e78026daa29527b39
-
SSDEEP
24576:H+zMHNjjkvLGzIlDU/3P/cA4Rf8B3G1zn4:ezM0GIRUB3wz4
Static task
static1
Behavioral task
behavioral1
Sample
Enq.xll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Enq.xll
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Port:
587 - Username:
yg�wt%�HIDHd�@CFHn�FE\s�Y^UK.�SP[ - Password:
9�TU������
Targets
-
-
Target
Enq.xll
-
Size
643KB
-
MD5
0ed458621a0e75e9dac09b9cf00b909d
-
SHA1
02f07b3badc63785cd66b181657322f851d3b0c2
-
SHA256
7a6f8590d4be989faccb34cd393e713fd80fa17e92d7613f33061d647d0e6d12
-
SHA512
2cb0a297922a609ccbebe3bd64ba8aa7560e2440753c0c39da545cb78248050d1bb0b98b92dd9e013ead850a7087882296bb464e7f639e8c5456b0955f9f9ac9
-
SSDEEP
12288:pn/zDvGHAykHSzLW/4+8bzbBSreMdbhgFK/UqWgmrMqir:NzbGHAzHAjX1CcLgYi
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-