General
-
Target
87b12672dd2f591e98ee15bea512b61d91446e3ebfac139ca0a8e5f98d6d9680
-
Size
611KB
-
Sample
240902-lar1waxhnb
-
MD5
d31f6091dde31b5c6933295c1a00422d
-
SHA1
3273955748dcc977ffcfce25106e784d37330514
-
SHA256
87b12672dd2f591e98ee15bea512b61d91446e3ebfac139ca0a8e5f98d6d9680
-
SHA512
67b32096e2336a416c2285c565dc3ab4428c16a2051601d2afd26b682c5377f6e2508668b768424d036926cadb8397e4d99d259c26b9bccc983a9864332a783a
-
SSDEEP
12288:a7FAl0ERrCAiLECEC20P7e7gQ4cWd0IDSQ3POv+IvL9C/NlxtsreT:RltAw0TcW93GWITWNf6reT
Static task
static1
Behavioral task
behavioral1
Sample
49f380b9a2d44434f616ac7e75c4eec8ee6a51296406462fc4b22d5195cc8954.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
49f380b9a2d44434f616ac7e75c4eec8ee6a51296406462fc4b22d5195cc8954.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.yillyenterprise.com - Port:
587 - Username:
[email protected] - Password:
Iseeyou.com
Targets
-
-
Target
49f380b9a2d44434f616ac7e75c4eec8ee6a51296406462fc4b22d5195cc8954
-
Size
1.1MB
-
MD5
bcdad11db3eef6c55ff05cf6bb46f2b3
-
SHA1
4d60df62b8ce9f5fb8c68d003219cc6f14746b7e
-
SHA256
49f380b9a2d44434f616ac7e75c4eec8ee6a51296406462fc4b22d5195cc8954
-
SHA512
c3d26569322c2e4d23e8c97e11d30267fd155b2ac7508d01fb776b33b3c6c8fb327b62b8c41160f1118562eb5190e20581b7f5ee525f6fa8f29b1e17f7587539
-
SSDEEP
12288:5wh08OGQuZLvqJFTP2pNrBXMNbey252y+z7zrEOjruLpXlRlbVcoJRCPHJ3z+:pnGQYTqQt3WHTApXlRlbq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-