General
-
Target
VBCNXNJGFJHFD9873487943.exe
-
Size
309KB
-
Sample
240910-3wv34a1enr
-
MD5
0259d1aa5bf063769f36e5056e554021
-
SHA1
b4943803c47fa2284c3d30c9e75feefe8a26c04f
-
SHA256
73a0e45c8cd2fcd49f0a3602aec912486610dddca32dc6f879c2d90660be1931
-
SHA512
4147998a187e2f8032f123c17ec4a85224b9ba2117ae69f9fc5416eccbac3c70df35ea3e6ed51e6ccd2f402f528a21acab8bb88905b71c19244987a2b43ba836
-
SSDEEP
3072:wrJxi2KLomWHzmYwKL3RId2zQx/V/iwCm0owzZ0z1GTohLXKHrW37X1Hq:wrJxjfHzIKL6Kw6oQ41GkhLXH71Hq
Static task
static1
Behavioral task
behavioral1
Sample
VBCNXNJGFJHFD9873487943.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.botswlogistics.com - Port:
587 - Username:
[email protected] - Password:
*(QSTCj8
Targets
-
-
Target
VBCNXNJGFJHFD9873487943.exe
-
Size
309KB
-
MD5
0259d1aa5bf063769f36e5056e554021
-
SHA1
b4943803c47fa2284c3d30c9e75feefe8a26c04f
-
SHA256
73a0e45c8cd2fcd49f0a3602aec912486610dddca32dc6f879c2d90660be1931
-
SHA512
4147998a187e2f8032f123c17ec4a85224b9ba2117ae69f9fc5416eccbac3c70df35ea3e6ed51e6ccd2f402f528a21acab8bb88905b71c19244987a2b43ba836
-
SSDEEP
3072:wrJxi2KLomWHzmYwKL3RId2zQx/V/iwCm0owzZ0z1GTohLXKHrW37X1Hq:wrJxjfHzIKL6Kw6oQ41GkhLXH71Hq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-