General
-
Target
4bfc0e1973bdd4aae7e5bb83c85f4786f8cd99a59aecb9b6eef0c83e935c1b7c
-
Size
669KB
-
Sample
241122-bnanms1mfz
-
MD5
8b0efd7826adfe770ae4fa27558fd95d
-
SHA1
bd5e6e14bac2cc498df19e9f2b564ecd41feced4
-
SHA256
4bfc0e1973bdd4aae7e5bb83c85f4786f8cd99a59aecb9b6eef0c83e935c1b7c
-
SHA512
0ddc5e66a67fb2871659f238ffe1637bbca88d4515ff3b56708cd1f50509a31d0ea0349073b9f03ee0d66c9dc292beb6c8844ce2429f7df765c6b7428a809301
-
SSDEEP
12288:FJ2tzqFTsnCLdbCIH5Ol7Y0J3MKNwKB+p+Be9qbw75hCWL5CeySRSxI7gD4Khmk2:K1CJtQ3J3MKNwUOtq2n
Static task
static1
Behavioral task
behavioral1
Sample
4bfc0e1973bdd4aae7e5bb83c85f4786f8cd99a59aecb9b6eef0c83e935c1b7c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4bfc0e1973bdd4aae7e5bb83c85f4786f8cd99a59aecb9b6eef0c83e935c1b7c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
chukwudi123
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
chukwudi123
Targets
-
-
Target
4bfc0e1973bdd4aae7e5bb83c85f4786f8cd99a59aecb9b6eef0c83e935c1b7c
-
Size
669KB
-
MD5
8b0efd7826adfe770ae4fa27558fd95d
-
SHA1
bd5e6e14bac2cc498df19e9f2b564ecd41feced4
-
SHA256
4bfc0e1973bdd4aae7e5bb83c85f4786f8cd99a59aecb9b6eef0c83e935c1b7c
-
SHA512
0ddc5e66a67fb2871659f238ffe1637bbca88d4515ff3b56708cd1f50509a31d0ea0349073b9f03ee0d66c9dc292beb6c8844ce2429f7df765c6b7428a809301
-
SSDEEP
12288:FJ2tzqFTsnCLdbCIH5Ol7Y0J3MKNwKB+p+Be9qbw75hCWL5CeySRSxI7gD4Khmk2:K1CJtQ3J3MKNwUOtq2n
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-