General
-
Target
dee5f75b7ba72c700faced41cca2742b
-
Size
508KB
-
Sample
240326-l4xs8afg62
-
MD5
dee5f75b7ba72c700faced41cca2742b
-
SHA1
5c7a7e84fd3f660d58ce1d5b758ef71022431887
-
SHA256
841f2238aad3dad34d644e6d952c27ce92f85368933ecbb832c0cd9557f9b253
-
SHA512
61032283bc49c1361301af07f7ba022e133e769fb05236eb3eb3cf15e1d2742af49a253a785084aa3a1478a1faa1417f1b2f4e0a5689bfefb05ded14cb30d911
-
SSDEEP
12288:jPyisc/yiY0hi3E7gBFxJ9SsNaVtrYkbxvvceRvhge:jxsc/ZY+XgrxJEsNaLrYm
Static task
static1
Behavioral task
behavioral1
Sample
dee5f75b7ba72c700faced41cca2742b.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
dee5f75b7ba72c700faced41cca2742b.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.mail.ru - Port:
587 - Username:
[email protected] - Password:
goodluck@123
Targets
-
-
Target
dee5f75b7ba72c700faced41cca2742b
-
Size
508KB
-
MD5
dee5f75b7ba72c700faced41cca2742b
-
SHA1
5c7a7e84fd3f660d58ce1d5b758ef71022431887
-
SHA256
841f2238aad3dad34d644e6d952c27ce92f85368933ecbb832c0cd9557f9b253
-
SHA512
61032283bc49c1361301af07f7ba022e133e769fb05236eb3eb3cf15e1d2742af49a253a785084aa3a1478a1faa1417f1b2f4e0a5689bfefb05ded14cb30d911
-
SSDEEP
12288:jPyisc/yiY0hi3E7gBFxJ9SsNaVtrYkbxvvceRvhge:jxsc/ZY+XgrxJEsNaLrYm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-