General
-
Target
21da434f1cebc3ad7d85dbc7213309b8.exe
-
Size
1.1MB
-
Sample
240910-jzfyssvfmf
-
MD5
21da434f1cebc3ad7d85dbc7213309b8
-
SHA1
962d0f9ee3861720e85dc512fdb6d1f06d0fe419
-
SHA256
cbd11d3e42fc32d331d0cd62e69068be9948c768720ab164856f080464f9d179
-
SHA512
3600282d1ef7bee541fb971c4c6acc83ba29d75275b8fa3849095dae3cf8ae979db7c7af0923d515fd3f3bbebf5018d020a1fb1873b3cfeffe90f36874797bb4
-
SSDEEP
24576:v4lavt0LkLL9IMixoEgeaKYUrgv9Wxq9MmCS:qkwkn9IMHeaKYUrgv9+aPCS
Static task
static1
Behavioral task
behavioral1
Sample
21da434f1cebc3ad7d85dbc7213309b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
21da434f1cebc3ad7d85dbc7213309b8.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
cy+G_(979n9N - Email To:
[email protected]
Targets
-
-
Target
21da434f1cebc3ad7d85dbc7213309b8.exe
-
Size
1.1MB
-
MD5
21da434f1cebc3ad7d85dbc7213309b8
-
SHA1
962d0f9ee3861720e85dc512fdb6d1f06d0fe419
-
SHA256
cbd11d3e42fc32d331d0cd62e69068be9948c768720ab164856f080464f9d179
-
SHA512
3600282d1ef7bee541fb971c4c6acc83ba29d75275b8fa3849095dae3cf8ae979db7c7af0923d515fd3f3bbebf5018d020a1fb1873b3cfeffe90f36874797bb4
-
SSDEEP
24576:v4lavt0LkLL9IMixoEgeaKYUrgv9Wxq9MmCS:qkwkn9IMHeaKYUrgv9+aPCS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext
-