General
-
Target
f4af9cbebc14edb5e103042e77aafaf5df450e962ed48a50835057a402e7ac0d
-
Size
732KB
-
Sample
241122-blzvra1met
-
MD5
1fec3931e41e678aa75fc54178fc022b
-
SHA1
1a5b49eb886fd553a71550161928e3b1141ec623
-
SHA256
f4af9cbebc14edb5e103042e77aafaf5df450e962ed48a50835057a402e7ac0d
-
SHA512
de815a0885cb4083eea7bcb1526b126af7a2f177d52d0a4167d21b6b796635e13403f159e46d1f81955c7ed6a2fd096549c7fffc96df550142343b753a9e2b38
-
SSDEEP
12288:QjFBZpTIhqGLeYM52n6cjv83K+WFAaGN7LUM+LYc+jEaeYMEQBNj7mERLFW27ZYu:mnT/G/ao6Qka+hNH4F+j0T
Static task
static1
Behavioral task
behavioral1
Sample
f4af9cbebc14edb5e103042e77aafaf5df450e962ed48a50835057a402e7ac0d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4af9cbebc14edb5e103042e77aafaf5df450e962ed48a50835057a402e7ac0d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
CHINADUA@#asx122
Targets
-
-
Target
f4af9cbebc14edb5e103042e77aafaf5df450e962ed48a50835057a402e7ac0d
-
Size
732KB
-
MD5
1fec3931e41e678aa75fc54178fc022b
-
SHA1
1a5b49eb886fd553a71550161928e3b1141ec623
-
SHA256
f4af9cbebc14edb5e103042e77aafaf5df450e962ed48a50835057a402e7ac0d
-
SHA512
de815a0885cb4083eea7bcb1526b126af7a2f177d52d0a4167d21b6b796635e13403f159e46d1f81955c7ed6a2fd096549c7fffc96df550142343b753a9e2b38
-
SSDEEP
12288:QjFBZpTIhqGLeYM52n6cjv83K+WFAaGN7LUM+LYc+jEaeYMEQBNj7mERLFW27ZYu:mnT/G/ao6Qka+hNH4F+j0T
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-