General
-
Target
d7191bd9419ce60f57122e0a3b6d8449
-
Size
1.3MB
-
Sample
240319-zr4mwsfe27
-
MD5
d7191bd9419ce60f57122e0a3b6d8449
-
SHA1
7b847b776a23dff9fa06429f7ab6bf05a27cf51c
-
SHA256
bb422900a755e4aa68626b1451545a2e36e1acf79d975ae6bda7da78313c3205
-
SHA512
92f48500661fcc1c54e949669a63e149b0ae57b7d8e7bff5cac5a92445e6d1fcce7d16f319cf054dd376756ea317a53bcf7d79e8c9e679530919c4b0faef92b8
-
SSDEEP
24576:xKjE76DODfx8Dgyfx8DgJTs5SjywMd6s38Yx8FwDZyfL:EE76+58Dgy58DgJI5SjyEsMYFZ6
Static task
static1
Behavioral task
behavioral1
Sample
d7191bd9419ce60f57122e0a3b6d8449.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d7191bd9419ce60f57122e0a3b6d8449.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.alexfoxfreight.com - Port:
587 - Username:
[email protected] - Password:
Ueos*93sj!#!12
Targets
-
-
Target
d7191bd9419ce60f57122e0a3b6d8449
-
Size
1.3MB
-
MD5
d7191bd9419ce60f57122e0a3b6d8449
-
SHA1
7b847b776a23dff9fa06429f7ab6bf05a27cf51c
-
SHA256
bb422900a755e4aa68626b1451545a2e36e1acf79d975ae6bda7da78313c3205
-
SHA512
92f48500661fcc1c54e949669a63e149b0ae57b7d8e7bff5cac5a92445e6d1fcce7d16f319cf054dd376756ea317a53bcf7d79e8c9e679530919c4b0faef92b8
-
SSDEEP
24576:xKjE76DODfx8Dgyfx8DgJTs5SjywMd6s38Yx8FwDZyfL:EE76+58Dgy58DgJI5SjyEsMYFZ6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-