General
-
Target
3c81f7d44209450901c1d9fc09cccd3e6b295692bb6ce0de0d8687e5c14e76d4
-
Size
526KB
-
Sample
240907-syaj3asfma
-
MD5
a87f31cda14bda48c769fa980feb2a1e
-
SHA1
100b3a61a474a499a163f45eb12c50aaa50f2a32
-
SHA256
3c81f7d44209450901c1d9fc09cccd3e6b295692bb6ce0de0d8687e5c14e76d4
-
SHA512
754a11aae74f47647f2406d0ded7b22306aaf50de3eacc3f3d78239aca47e81ebffea2735f0f546494312bfc051b5933d793dcf9bb354e2339061200a3e93330
-
SSDEEP
12288:1ZWu39PRgd41FAtSac5bOWAt4wmm3qpHjsiz0KlZPe4fRPEaS:1wGPRgdJtSac5CWNYiwKlZPxR8L
Behavioral task
behavioral1
Sample
d3956670c2fb4ab0739bff8f47efc5f6accc848960a9ec11e8bb1849dfc8a59d.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d3956670c2fb4ab0739bff8f47efc5f6accc848960a9ec11e8bb1849dfc8a59d.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mahesh-ent.com - Port:
587 - Username:
[email protected] - Password:
M@hesh3981 - Email To:
[email protected]
Targets
-
-
Target
d3956670c2fb4ab0739bff8f47efc5f6accc848960a9ec11e8bb1849dfc8a59d.exe
-
Size
551KB
-
MD5
235fd45bf6dbc62b5310a71e761ee5a6
-
SHA1
3ffdfbd18c6259fbc62c3cdc1f82977f9808143a
-
SHA256
d3956670c2fb4ab0739bff8f47efc5f6accc848960a9ec11e8bb1849dfc8a59d
-
SHA512
ed7b8ec2019001dfc16ab8161579104cb0d7adf7795507d23d0ddd3a0b455b46d7844e30e56bdf07567c7bff0be124b4d4ad93ad7310bc6c1817b28b3c417d82
-
SSDEEP
12288:3YV6MorX7qzuC3QHO9FQVHPF51jgc322X3x+XorsE5hl7qS:EBXu9HGaVH35X34pE5hlR
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-