General
-
Target
OC & PL.BZ2
-
Size
633KB
-
Sample
241120-ssvytayhpp
-
MD5
18913cf92adc2b48ce647c9b1fc7bf38
-
SHA1
8f8edd97d4419f40856b0a6ab6c0ba915ce2b980
-
SHA256
dfb29a97ceff190f944e6180934803326d6f1fae8c1cf6caa4a6eec1c9f6c410
-
SHA512
ba929be9e8dc012c0c28722f054a61818486b1812fb34051a8804148f3b47640c413377888ceb5c774b2ec12f8481a8453a8dacf54d71931ffbbbdf2b0d54499
-
SSDEEP
12288:FHhZ8eoBsOJUoey3WASR+1/tP/9KNzjUVB3cW8tYK3der1Zcokl7e:FHTnoWO5eizSR+5dsNUkW8D3dCQl7e
Static task
static1
Behavioral task
behavioral1
Sample
OC & PL.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
OC & PL.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.agaliofu.top - Port:
587 - Username:
[email protected] - Password:
QPS.6YYl.Yi= - Email To:
[email protected]
Targets
-
-
Target
OC & PL.exe
-
Size
1.2MB
-
MD5
c6a534ee57dee61cb20b631d697a6a09
-
SHA1
e9f122b4daf12299d0a55e6e51801b386063ed61
-
SHA256
ad4cfc06bad357de4ab58c9c01bc2e7015fd1944e35a206ef8b053611119f04f
-
SHA512
74fb83e33ddc07dba47045674747d40d56aeb1e511cc6d5217d86967c1c6e169fd46e0b49e0dd2ce97799b7bf01170f4567becd2b857300869403cb952726e1b
-
SSDEEP
24576:+tb20pkaCqT5TBWgNQ7aujW8l3JCQz6A:rVg5tQ7aujd7p5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-