General
-
Target
d7a4af0b2cc553ae6000075001b52f53c9c1a694708610d6a8b427697b17fb44
-
Size
392KB
-
Sample
240831-3fqtfa1gqq
-
MD5
8de958581c6f1bc184e860b889a6ccc8
-
SHA1
6db4a38d58398e6b85d9ad387567d9f1f4464e31
-
SHA256
d7a4af0b2cc553ae6000075001b52f53c9c1a694708610d6a8b427697b17fb44
-
SHA512
df02278e89ac87def614cb02ee5c5eb15e5cef9d03239e0a6fe7d7a6b42d3b90ed2cd491a1be0491bf9c91bc92a9770c3e19c8337c5cac893350f70fffdd9184
-
SSDEEP
6144:Z7aI034zmD6WKpeRsExOv6ksSYVKZ9fyrleyOyYootrLXRhW0Yw0xKTQqti3Weoi:oI034FpeXm6CHZlyrEy1+5S0Yw02ti3B
Static task
static1
Behavioral task
behavioral1
Sample
Curriculum Vitae.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ofilsysterns.com - Port:
587 - Username:
[email protected] - Password:
@o^M)K*1
Targets
-
-
Target
Curriculum Vitae.exe
-
Size
401KB
-
MD5
e9a2e9f1ed8575797604981d5044e140
-
SHA1
490c2170713f8aec885ae67f5e9dbce7dcba24a7
-
SHA256
0283cabedfe0c400c64023384f84b80c7c289dd509f61b8aaded1d57ec61cab0
-
SHA512
328a2e366c7d8b2bf01562b2a3917ce35e46ac720d07f62a3401a7b9251ce75c687b98083b995e3f22c08b2fc3697c653d85f98ef61656962fe142ca7caa3dd7
-
SSDEEP
6144:shQAY7WxKN7wWVZdgK7SuNdmAfaE3VXJA0w1GDK10zONAiXDTgugHbXVVNOg:sa+eVZltNddVX3CGDKrpvoo
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-