General
-
Target
d4ac2e301d054744db922f396d497a1f
-
Size
641KB
-
Sample
240318-3s8vsacf6z
-
MD5
d4ac2e301d054744db922f396d497a1f
-
SHA1
0a580a7ca5e1e2128ab507e644df45c54d939192
-
SHA256
fdaff5b7230a045f22dcafc4da592c42c3386770c58757cc825a99fcef5f1f78
-
SHA512
727f62c850bfad6d682d33f4aafa2a4442155b573f6b8fea8ba2c5d68617d4272e2e54083126bb1e8e712ce5acfbd543663268092ec24c422512450509d61cc0
-
SSDEEP
12288:wOsBgo0q4wMUsutJ0PNXVGYC+0quXXkzItj+DFZWWwobEnNeUJ:wOsBgo0q4wMEJQXd6qYXkkcJZzwHNe2
Static task
static1
Behavioral task
behavioral1
Sample
d4ac2e301d054744db922f396d497a1f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4ac2e301d054744db922f396d497a1f.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.ipissbgroup.com - Port:
587 - Username:
[email protected] - Password:
Possiblegod12345
Targets
-
-
Target
d4ac2e301d054744db922f396d497a1f
-
Size
641KB
-
MD5
d4ac2e301d054744db922f396d497a1f
-
SHA1
0a580a7ca5e1e2128ab507e644df45c54d939192
-
SHA256
fdaff5b7230a045f22dcafc4da592c42c3386770c58757cc825a99fcef5f1f78
-
SHA512
727f62c850bfad6d682d33f4aafa2a4442155b573f6b8fea8ba2c5d68617d4272e2e54083126bb1e8e712ce5acfbd543663268092ec24c422512450509d61cc0
-
SSDEEP
12288:wOsBgo0q4wMUsutJ0PNXVGYC+0quXXkzItj+DFZWWwobEnNeUJ:wOsBgo0q4wMEJQXd6qYXkkcJZzwHNe2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-