General
-
Target
38418060a0ff844bcd7e4e58199ae5efe6ef1dfe0c1c71cbee32e7731bebc8f8
-
Size
672KB
-
Sample
240620-cst4hsxgnn
-
MD5
a15edf9625691b79cdf4c0379ce7df61
-
SHA1
005280e78b89c35d5ce82a7bfbd9a6b2776e86e2
-
SHA256
38418060a0ff844bcd7e4e58199ae5efe6ef1dfe0c1c71cbee32e7731bebc8f8
-
SHA512
ae3156d81c49af712b771b4e3bdc18df35198727e867b42208514e8c24bf847441a99a61f9d82ab8ee1b89b17c6ec613a0a149d8553495d447b8dffb4928cb73
-
SSDEEP
6144:Tg5JHngOgeFAFOeFArazd5TqJzLBErQVojt/lVDjZc7alXP7DX2CB1/h:iJgOgzFOzuzd5kBErOojt/lN+7a97DlZ
Static task
static1
Behavioral task
behavioral1
Sample
38418060a0ff844bcd7e4e58199ae5efe6ef1dfe0c1c71cbee32e7731bebc8f8.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
38418060a0ff844bcd7e4e58199ae5efe6ef1dfe0c1c71cbee32e7731bebc8f8.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
COKOeve8899
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
COKOeve8899
Targets
-
-
Target
38418060a0ff844bcd7e4e58199ae5efe6ef1dfe0c1c71cbee32e7731bebc8f8
-
Size
672KB
-
MD5
a15edf9625691b79cdf4c0379ce7df61
-
SHA1
005280e78b89c35d5ce82a7bfbd9a6b2776e86e2
-
SHA256
38418060a0ff844bcd7e4e58199ae5efe6ef1dfe0c1c71cbee32e7731bebc8f8
-
SHA512
ae3156d81c49af712b771b4e3bdc18df35198727e867b42208514e8c24bf847441a99a61f9d82ab8ee1b89b17c6ec613a0a149d8553495d447b8dffb4928cb73
-
SSDEEP
6144:Tg5JHngOgeFAFOeFArazd5TqJzLBErQVojt/lVDjZc7alXP7DX2CB1/h:iJgOgzFOzuzd5kBErOojt/lN+7a97DlZ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-