General
-
Target
ed3164bb98a402b24a8f96552c01d24a577244ed9547e4d2458805fd8d2d9545
-
Size
551KB
-
Sample
241122-bjlv4s1mas
-
MD5
486af240c971d660436bf37dfb3cfa7f
-
SHA1
bbfd5d330f3a7dc5db2aebaac816e6cf9dc072b5
-
SHA256
ed3164bb98a402b24a8f96552c01d24a577244ed9547e4d2458805fd8d2d9545
-
SHA512
478e65690b1fa79d18875cb8d20a7f11eba38c6daa1ecb0ea4e02a82749c666610d4a42330614b0b835c567efee0e2d0c55d7c26c81a606245ffc35ac3fa0d68
-
SSDEEP
6144:DGxhLKgImlvAm9O27MXyCXlgzyWYlR/mDT6xrtzRbSbgAldpPI2SQN4j6YFgYi:CCH+dU6MXyCXYyHlR/6TaJUJNNqCYi
Static task
static1
Behavioral task
behavioral1
Sample
ed3164bb98a402b24a8f96552c01d24a577244ed9547e4d2458805fd8d2d9545.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ed3164bb98a402b24a8f96552c01d24a577244ed9547e4d2458805fd8d2d9545.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
C%)%GWZe9
Targets
-
-
Target
ed3164bb98a402b24a8f96552c01d24a577244ed9547e4d2458805fd8d2d9545
-
Size
551KB
-
MD5
486af240c971d660436bf37dfb3cfa7f
-
SHA1
bbfd5d330f3a7dc5db2aebaac816e6cf9dc072b5
-
SHA256
ed3164bb98a402b24a8f96552c01d24a577244ed9547e4d2458805fd8d2d9545
-
SHA512
478e65690b1fa79d18875cb8d20a7f11eba38c6daa1ecb0ea4e02a82749c666610d4a42330614b0b835c567efee0e2d0c55d7c26c81a606245ffc35ac3fa0d68
-
SSDEEP
6144:DGxhLKgImlvAm9O27MXyCXlgzyWYlR/mDT6xrtzRbSbgAldpPI2SQN4j6YFgYi:CCH+dU6MXyCXYyHlR/6TaJUJNNqCYi
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-