General
-
Target
ea3a09524e9ea4c89eee653c1e65d409922ecc7a94e99e02457744428929399a
-
Size
1.1MB
-
Sample
240726-djllfswaqb
-
MD5
47f0af1950096dbef5994ac777475751
-
SHA1
933742ab7892a4f7943584eabb87b4a60e47abd0
-
SHA256
ea3a09524e9ea4c89eee653c1e65d409922ecc7a94e99e02457744428929399a
-
SHA512
c0d90e5aba7eecb223f6bbdfc7e39d16087c705ad9dab5bee7a65a25c28b66b3f33006a614c0c591a259493ba12e4b911c55560ce3d781e8f62ee44105945d7a
-
SSDEEP
24576:x/u8ew1D1jP0qpTRVYvvgXPL7b8NxjndOCgL4H444l:Dew1D1jP0qpFVYvvgXPLeddOlL4H444l
Static task
static1
Behavioral task
behavioral1
Sample
ea3a09524e9ea4c89eee653c1e65d409922ecc7a94e99e02457744428929399a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea3a09524e9ea4c89eee653c1e65d409922ecc7a94e99e02457744428929399a.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.prohandlift.com - Port:
587 - Username:
[email protected] - Password:
sri25 - Email To:
[email protected]
Targets
-
-
Target
ea3a09524e9ea4c89eee653c1e65d409922ecc7a94e99e02457744428929399a
-
Size
1.1MB
-
MD5
47f0af1950096dbef5994ac777475751
-
SHA1
933742ab7892a4f7943584eabb87b4a60e47abd0
-
SHA256
ea3a09524e9ea4c89eee653c1e65d409922ecc7a94e99e02457744428929399a
-
SHA512
c0d90e5aba7eecb223f6bbdfc7e39d16087c705ad9dab5bee7a65a25c28b66b3f33006a614c0c591a259493ba12e4b911c55560ce3d781e8f62ee44105945d7a
-
SSDEEP
24576:x/u8ew1D1jP0qpTRVYvvgXPL7b8NxjndOCgL4H444l:Dew1D1jP0qpFVYvvgXPLeddOlL4H444l
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext
-