General
-
Target
ac76085014662c8bdeaac88d6266deb35919d78ebbca4ba81d70c7c9081d5870
-
Size
418KB
-
Sample
241122-btqxtaxmhl
-
MD5
775815af226a71175dccb3008949eadc
-
SHA1
ab0eef4b2b821cb12f5080b0efa10a8016c6101f
-
SHA256
ac76085014662c8bdeaac88d6266deb35919d78ebbca4ba81d70c7c9081d5870
-
SHA512
775805293e1171d429579ab9da93ebece7c1bbe1c9e113155f66178e5d22df794d5e4472efdbbcdddc67dc8232f2cadb93694094eda2d71b7b8d9a19a7470b05
-
SSDEEP
12288:pHRESKD2Jc/pc/ObxiOUQLoCpXer/feFUbQTh8:taSKSJywOb8eJQWFUbQC
Static task
static1
Behavioral task
behavioral1
Sample
ac76085014662c8bdeaac88d6266deb35919d78ebbca4ba81d70c7c9081d5870.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ac76085014662c8bdeaac88d6266deb35919d78ebbca4ba81d70c7c9081d5870.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.uae-messefrankfurt.com - Port:
587 - Username:
[email protected] - Password:
junior080
Targets
-
-
Target
ac76085014662c8bdeaac88d6266deb35919d78ebbca4ba81d70c7c9081d5870
-
Size
418KB
-
MD5
775815af226a71175dccb3008949eadc
-
SHA1
ab0eef4b2b821cb12f5080b0efa10a8016c6101f
-
SHA256
ac76085014662c8bdeaac88d6266deb35919d78ebbca4ba81d70c7c9081d5870
-
SHA512
775805293e1171d429579ab9da93ebece7c1bbe1c9e113155f66178e5d22df794d5e4472efdbbcdddc67dc8232f2cadb93694094eda2d71b7b8d9a19a7470b05
-
SSDEEP
12288:pHRESKD2Jc/pc/ObxiOUQLoCpXer/feFUbQTh8:taSKSJywOb8eJQWFUbQC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1