General
-
Target
d7366bcee00e2aa26ddea11d2b7d7472
-
Size
713KB
-
Sample
240319-1xk86she4t
-
MD5
d7366bcee00e2aa26ddea11d2b7d7472
-
SHA1
b72a36ba160f80d398d338785068e6da841c8257
-
SHA256
bf88eb4511a5b91350a9d657b5fe620f6d2bf23098b58200cbd1677eb4228cce
-
SHA512
94f41906cfa23487d2439187554966f127ba5765478ae962fdddcb30985047dfefcb0b384093b2a0b3f90c4718cf4bcbd65a7d65217f496905dccf950c34829e
-
SSDEEP
12288:fik+G8J8QS19c9XRXSOGl6Yql+oiO0o0ABcNCkEkdfdK4ezvnMDpCcFY9fHSmK:f+jJ8/DsHGoplViO0ZCvCnSvnMdfFY9U
Static task
static1
Behavioral task
behavioral1
Sample
d7366bcee00e2aa26ddea11d2b7d7472.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
d7366bcee00e2aa26ddea11d2b7d7472.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
uscentral50.myserverhosts.com - Port:
587 - Username:
[email protected] - Password:
waters@789
Targets
-
-
Target
d7366bcee00e2aa26ddea11d2b7d7472
-
Size
713KB
-
MD5
d7366bcee00e2aa26ddea11d2b7d7472
-
SHA1
b72a36ba160f80d398d338785068e6da841c8257
-
SHA256
bf88eb4511a5b91350a9d657b5fe620f6d2bf23098b58200cbd1677eb4228cce
-
SHA512
94f41906cfa23487d2439187554966f127ba5765478ae962fdddcb30985047dfefcb0b384093b2a0b3f90c4718cf4bcbd65a7d65217f496905dccf950c34829e
-
SSDEEP
12288:fik+G8J8QS19c9XRXSOGl6Yql+oiO0o0ABcNCkEkdfdK4ezvnMDpCcFY9fHSmK:f+jJ8/DsHGoplViO0ZCvCnSvnMdfFY9U
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-