General
-
Target
a7d2fb68bc40f6799cf17ceb8c150df30f19d7112ca6ca3f96c87d655e85f942.exe
-
Size
1.0MB
-
Sample
240905-b3hb2a1akn
-
MD5
81135e57b4093fe559bf840d44268bc7
-
SHA1
46f1bc65158143f12d580d981ab7030f6fe3744d
-
SHA256
a7d2fb68bc40f6799cf17ceb8c150df30f19d7112ca6ca3f96c87d655e85f942
-
SHA512
cb02a114fc5616fd428a637e65a5c1d8fc2f7a9fdd6415097e8e3e0742c3e7f72a0e4d4a5d0a8087c046282ae7189c5f14fa7cc89f9eab0bcf6e7ba58b9526e6
-
SSDEEP
24576:1sjj0y7v3yoK3pIGfm3V4XsgTkHmX4CTHSi/SFYyfi5SfAy:ewy7PyT3pIGu3V4cgYUX/MYyfi5SfD
Static task
static1
Behavioral task
behavioral1
Sample
a7d2fb68bc40f6799cf17ceb8c150df30f19d7112ca6ca3f96c87d655e85f942.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a7d2fb68bc40f6799cf17ceb8c150df30f19d7112ca6ca3f96c87d655e85f942.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.fasmacopy.gr - Port:
587 - Username:
[email protected] - Password:
Fam28sjd - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.fasmacopy.gr - Port:
587 - Username:
[email protected] - Password:
Fam28sjd
Targets
-
-
Target
a7d2fb68bc40f6799cf17ceb8c150df30f19d7112ca6ca3f96c87d655e85f942.exe
-
Size
1.0MB
-
MD5
81135e57b4093fe559bf840d44268bc7
-
SHA1
46f1bc65158143f12d580d981ab7030f6fe3744d
-
SHA256
a7d2fb68bc40f6799cf17ceb8c150df30f19d7112ca6ca3f96c87d655e85f942
-
SHA512
cb02a114fc5616fd428a637e65a5c1d8fc2f7a9fdd6415097e8e3e0742c3e7f72a0e4d4a5d0a8087c046282ae7189c5f14fa7cc89f9eab0bcf6e7ba58b9526e6
-
SSDEEP
24576:1sjj0y7v3yoK3pIGfm3V4XsgTkHmX4CTHSi/SFYyfi5SfAy:ewy7PyT3pIGu3V4cgYUX/MYyfi5SfD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-