General
-
Target
f943f06dedcd8017ca95691364f90df38fb8e9e4620bb5a5fc9739d0b2797446N
-
Size
234KB
-
Sample
240921-pax4ns1ekf
-
MD5
088211e09899d6a902f83b94702a8560
-
SHA1
ac96782481cfc2c3a9db33e1e1fa560e7303548e
-
SHA256
f943f06dedcd8017ca95691364f90df38fb8e9e4620bb5a5fc9739d0b2797446
-
SHA512
357b23af38e19e289cec7cb57c948929e29b2e7c971f3f688a50c08bbd3764a6450a5aeadb9eb183e7b144d1b098f68dd7813bd8986df0d5e970db09a26094b1
-
SSDEEP
3072:8d0e4UfeCwl7L+hWlLzb9nJvc+guf2Omj5lVTDha:8d0e4UfeCc7L+hWxzb9nS+gY2OmxTl
Behavioral task
behavioral1
Sample
f943f06dedcd8017ca95691364f90df38fb8e9e4620bb5a5fc9739d0b2797446N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f943f06dedcd8017ca95691364f90df38fb8e9e4620bb5a5fc9739d0b2797446N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
aowapnzgtwgqowgt - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
aowapnzgtwgqowgt
Targets
-
-
Target
f943f06dedcd8017ca95691364f90df38fb8e9e4620bb5a5fc9739d0b2797446N
-
Size
234KB
-
MD5
088211e09899d6a902f83b94702a8560
-
SHA1
ac96782481cfc2c3a9db33e1e1fa560e7303548e
-
SHA256
f943f06dedcd8017ca95691364f90df38fb8e9e4620bb5a5fc9739d0b2797446
-
SHA512
357b23af38e19e289cec7cb57c948929e29b2e7c971f3f688a50c08bbd3764a6450a5aeadb9eb183e7b144d1b098f68dd7813bd8986df0d5e970db09a26094b1
-
SSDEEP
3072:8d0e4UfeCwl7L+hWlLzb9nJvc+guf2Omj5lVTDha:8d0e4UfeCc7L+hWxzb9nS+gY2OmxTl
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-