General
-
Target
e146d579d1e2ccb3ae39881ab53d67a5
-
Size
819KB
-
Sample
240327-kvwn5agg83
-
MD5
e146d579d1e2ccb3ae39881ab53d67a5
-
SHA1
0ee90d5f0f44b921b6eb043882bfca1fa59825d6
-
SHA256
4b50ad683aa4fa64ea52f33f77fdee2ee70c1c98bae14f75982469520830cc55
-
SHA512
3ad8afa102b344069bf183f45905f1e35c62b186b121efb65090bcff41855f514308ad461aa547b87e0d80e0d9d7a255708f4f7f80fb52d3e6f37edd645fff17
-
SSDEEP
12288:O1SjlOAQZSoR65AXwgFvuSSiILJf5ZjGXSTZjgpsecmEDzZZHTydD1166/vDiT6:/oR6qg/PKiJgpsZDw/ZnD86BqLPYO
Static task
static1
Behavioral task
behavioral1
Sample
e146d579d1e2ccb3ae39881ab53d67a5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e146d579d1e2ccb3ae39881ab53d67a5.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.brimaq.com - Port:
587 - Username:
[email protected] - Password:
brimaQ2012 - Email To:
[email protected]
Targets
-
-
Target
e146d579d1e2ccb3ae39881ab53d67a5
-
Size
819KB
-
MD5
e146d579d1e2ccb3ae39881ab53d67a5
-
SHA1
0ee90d5f0f44b921b6eb043882bfca1fa59825d6
-
SHA256
4b50ad683aa4fa64ea52f33f77fdee2ee70c1c98bae14f75982469520830cc55
-
SHA512
3ad8afa102b344069bf183f45905f1e35c62b186b121efb65090bcff41855f514308ad461aa547b87e0d80e0d9d7a255708f4f7f80fb52d3e6f37edd645fff17
-
SSDEEP
12288:O1SjlOAQZSoR65AXwgFvuSSiILJf5ZjGXSTZjgpsecmEDzZZHTydD1166/vDiT6:/oR6qg/PKiJgpsZDw/ZnD86BqLPYO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-