General
-
Target
14e293debe857a77631af0fbcd9540f3c9279f502996b36698e355d907e2d7c3
-
Size
448KB
-
Sample
240831-l2harayamf
-
MD5
7aabf5b43deb04cf3197c01f80e11701
-
SHA1
27dcb807e1ae7c9bd40d64255845e62b7fc3d8b4
-
SHA256
14e293debe857a77631af0fbcd9540f3c9279f502996b36698e355d907e2d7c3
-
SHA512
569a6f57a5e0d31a51ddebe315eb2597ba75882ff9415b941e87bac3c08435d2c21e7e73413abd25eead387845fe642cd68cad62c83e9eeb46812cd87b6a82ae
-
SSDEEP
12288:I9dC8Xgcvainf/bB2Bb371Zh5DFjQ8LQHMUg9HV3EV2pYV43tZJNd6wl:2C88uHN2BD71ZGfHIz443tZF6wl
Static task
static1
Behavioral task
behavioral1
Sample
aa4ad6d6d4ac2d0e32a895dbe8f8537f7e82d061a4abea02462a7a4c51cc8b50.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aa4ad6d6d4ac2d0e32a895dbe8f8537f7e82d061a4abea02462a7a4c51cc8b50.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
baorhihusmusqbnx
Targets
-
-
Target
aa4ad6d6d4ac2d0e32a895dbe8f8537f7e82d061a4abea02462a7a4c51cc8b50
-
Size
537KB
-
MD5
8d5bb7ad4e2c5ba6f53c7a35d32d021f
-
SHA1
5aa6d8ccf475906c2a9fcc0c6d8455bc50974afe
-
SHA256
aa4ad6d6d4ac2d0e32a895dbe8f8537f7e82d061a4abea02462a7a4c51cc8b50
-
SHA512
a5d7bacf4e2fa533d18e02b093399b46a3377d89b4ab9050be76aaf619f83af7a80d0dfa4ba8bf6a148219608f6c5fdb39a2ffc3c6dcb6dcd49de0519fe0c165
-
SSDEEP
12288:ueK1S/XHZG4Uc4u3rgBXRc3lvfrREKGH1Dj:ueRBUZHcVr5GV3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-