General
-
Target
09c3f01c88256da1d9bbb9f8e22af222b275cf775552353057fe6aaf0e054994
-
Size
1.2MB
-
Sample
240806-bsb29syfle
-
MD5
6c0677cee96bc2bc17ef8f5ff4592312
-
SHA1
d77270dafd652215d720ee946f071b6aa300a14a
-
SHA256
09c3f01c88256da1d9bbb9f8e22af222b275cf775552353057fe6aaf0e054994
-
SHA512
27912e6b8ac2638f7947314607704b7282ffd59e1d4c61b7543a1c82bcaa92b75b7051e59bc7672ba7bccbd1409a2c94c24e84a4304d9e263499877385898941
-
SSDEEP
24576:tAHnh+eWsN3skA4RV1Hom2KXMmHaI6nnjqKoeBt0ZhX7Lj15:Mh+ZkldoPK8YaNjqKoeBt0TLL
Static task
static1
Behavioral task
behavioral1
Sample
09c3f01c88256da1d9bbb9f8e22af222b275cf775552353057fe6aaf0e054994.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
09c3f01c88256da1d9bbb9f8e22af222b275cf775552353057fe6aaf0e054994.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mahesh-ent.com - Port:
587 - Username:
[email protected] - Password:
M@hesh3981 - Email To:
[email protected]
Targets
-
-
Target
09c3f01c88256da1d9bbb9f8e22af222b275cf775552353057fe6aaf0e054994
-
Size
1.2MB
-
MD5
6c0677cee96bc2bc17ef8f5ff4592312
-
SHA1
d77270dafd652215d720ee946f071b6aa300a14a
-
SHA256
09c3f01c88256da1d9bbb9f8e22af222b275cf775552353057fe6aaf0e054994
-
SHA512
27912e6b8ac2638f7947314607704b7282ffd59e1d4c61b7543a1c82bcaa92b75b7051e59bc7672ba7bccbd1409a2c94c24e84a4304d9e263499877385898941
-
SSDEEP
24576:tAHnh+eWsN3skA4RV1Hom2KXMmHaI6nnjqKoeBt0ZhX7Lj15:Mh+ZkldoPK8YaNjqKoeBt0TLL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-