General
-
Target
e4260671694c69b19811fd7c581ad17ebd15f5946409752a7dc12e2544acbc5f
-
Size
235KB
-
Sample
240829-mtaflszakr
-
MD5
ebb338fc98f9397e7c1f1526ddc7764c
-
SHA1
4e55acef885627435afd5fcadd676acab23764ae
-
SHA256
e4260671694c69b19811fd7c581ad17ebd15f5946409752a7dc12e2544acbc5f
-
SHA512
868f8ad6288dbb42b82f35012ece47523d717e95a66271d391488cfecdc2c19d02e234ec58110f4e0151c00ed0ff4411b688b3a4a3b593ae791950475650ba84
-
SSDEEP
3072:y6N1b7TjLrhKyApfqIqohCsOxBI25HJWGR2U:y0b7TjLrhKyApfqIvhDOxBI1Gs
Behavioral task
behavioral1
Sample
e4260671694c69b19811fd7c581ad17ebd15f5946409752a7dc12e2544acbc5f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e4260671694c69b19811fd7c581ad17ebd15f5946409752a7dc12e2544acbc5f.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.navana-battery.com - Port:
587 - Username:
[email protected] - Password:
Test&123 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.navana-battery.com - Port:
587 - Username:
[email protected] - Password:
Test&123
Targets
-
-
Target
e4260671694c69b19811fd7c581ad17ebd15f5946409752a7dc12e2544acbc5f
-
Size
235KB
-
MD5
ebb338fc98f9397e7c1f1526ddc7764c
-
SHA1
4e55acef885627435afd5fcadd676acab23764ae
-
SHA256
e4260671694c69b19811fd7c581ad17ebd15f5946409752a7dc12e2544acbc5f
-
SHA512
868f8ad6288dbb42b82f35012ece47523d717e95a66271d391488cfecdc2c19d02e234ec58110f4e0151c00ed0ff4411b688b3a4a3b593ae791950475650ba84
-
SSDEEP
3072:y6N1b7TjLrhKyApfqIqohCsOxBI25HJWGR2U:y0b7TjLrhKyApfqIvhDOxBI1Gs
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-