General
-
Target
617d863f1b43048ead4d7d3aa2c421604baea0e72818f8747864cc8c5eae8ca0
-
Size
434KB
-
Sample
241122-bnyepsxmbl
-
MD5
3ac70061c13c9acac12e225d66587916
-
SHA1
62508686dac199a914f24393cd792141d78dc319
-
SHA256
617d863f1b43048ead4d7d3aa2c421604baea0e72818f8747864cc8c5eae8ca0
-
SHA512
6c4075d9a493e9cc83c6d6d866d4db435ac297e7879f8758946c54f5a6bd6e38be992ec716352c03bfb79979401bde0a635cf3e60591ffb7a4bee188ecbd3500
-
SSDEEP
12288:cgdYv2UucyVqT/1n7UP/cQiH/SOEdL0YEmZ9bQTh8:cR2UR2wN7WUvKBd/9bQC
Static task
static1
Behavioral task
behavioral1
Sample
617d863f1b43048ead4d7d3aa2c421604baea0e72818f8747864cc8c5eae8ca0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
617d863f1b43048ead4d7d3aa2c421604baea0e72818f8747864cc8c5eae8ca0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.vinorema.com - Port:
587 - Username:
[email protected] - Password:
tempranillo03
Targets
-
-
Target
617d863f1b43048ead4d7d3aa2c421604baea0e72818f8747864cc8c5eae8ca0
-
Size
434KB
-
MD5
3ac70061c13c9acac12e225d66587916
-
SHA1
62508686dac199a914f24393cd792141d78dc319
-
SHA256
617d863f1b43048ead4d7d3aa2c421604baea0e72818f8747864cc8c5eae8ca0
-
SHA512
6c4075d9a493e9cc83c6d6d866d4db435ac297e7879f8758946c54f5a6bd6e38be992ec716352c03bfb79979401bde0a635cf3e60591ffb7a4bee188ecbd3500
-
SSDEEP
12288:cgdYv2UucyVqT/1n7UP/cQiH/SOEdL0YEmZ9bQTh8:cR2UR2wN7WUvKBd/9bQC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-