e209b671ef6ce034fa39474b107f4eb8.exe

General
Target

e209b671ef6ce034fa39474b107f4eb8.exe

Size

983KB

Sample

210421-vwhxhtkwz2

Score
10 /10
MD5

e209b671ef6ce034fa39474b107f4eb8

SHA1

c36f2e6b420f734d106f0eb3b89d210f17cf4022

SHA256

001706c59174b47d3adb36f4d33ec09088af0f5899807e418a46d8747b07bab7

SHA512

608cc46338f851e5216cd7e8ed4aa173473abde2d482166acbfa012245c86aac4ed6111b35e012c4cf89f0367618a723079e3f48435f457d2795efde70b3485d

Malware Config

Extracted

Family agenttesla
Credentials

Protocol: smtp

Host: mail.cerak.co.rs

Port: 587

Username: pedja@cerak.co.rs

Password: isidora456

Targets
Target

e209b671ef6ce034fa39474b107f4eb8.exe

MD5

e209b671ef6ce034fa39474b107f4eb8

Filesize

983KB

Score
10 /10
SHA1

c36f2e6b420f734d106f0eb3b89d210f17cf4022

SHA256

001706c59174b47d3adb36f4d33ec09088af0f5899807e418a46d8747b07bab7

SHA512

608cc46338f851e5216cd7e8ed4aa173473abde2d482166acbfa012245c86aac4ed6111b35e012c4cf89f0367618a723079e3f48435f457d2795efde70b3485d

Tags

Signatures

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                    Privilege Escalation
                      Tasks

                      static1

                      behavioral1

                      3/10