General
-
Target
ad4cfc06bad357de4ab58c9c01bc2e7015fd1944e35a206ef8b053611119f04f.exe
-
Size
1.2MB
-
Sample
241122-dfbbbayqdj
-
MD5
c6a534ee57dee61cb20b631d697a6a09
-
SHA1
e9f122b4daf12299d0a55e6e51801b386063ed61
-
SHA256
ad4cfc06bad357de4ab58c9c01bc2e7015fd1944e35a206ef8b053611119f04f
-
SHA512
74fb83e33ddc07dba47045674747d40d56aeb1e511cc6d5217d86967c1c6e169fd46e0b49e0dd2ce97799b7bf01170f4567becd2b857300869403cb952726e1b
-
SSDEEP
24576:+tb20pkaCqT5TBWgNQ7aujW8l3JCQz6A:rVg5tQ7aujd7p5
Static task
static1
Behavioral task
behavioral1
Sample
ad4cfc06bad357de4ab58c9c01bc2e7015fd1944e35a206ef8b053611119f04f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ad4cfc06bad357de4ab58c9c01bc2e7015fd1944e35a206ef8b053611119f04f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.agaliofu.top - Port:
587 - Username:
[email protected] - Password:
QPS.6YYl.Yi= - Email To:
[email protected]
Targets
-
-
Target
ad4cfc06bad357de4ab58c9c01bc2e7015fd1944e35a206ef8b053611119f04f.exe
-
Size
1.2MB
-
MD5
c6a534ee57dee61cb20b631d697a6a09
-
SHA1
e9f122b4daf12299d0a55e6e51801b386063ed61
-
SHA256
ad4cfc06bad357de4ab58c9c01bc2e7015fd1944e35a206ef8b053611119f04f
-
SHA512
74fb83e33ddc07dba47045674747d40d56aeb1e511cc6d5217d86967c1c6e169fd46e0b49e0dd2ce97799b7bf01170f4567becd2b857300869403cb952726e1b
-
SSDEEP
24576:+tb20pkaCqT5TBWgNQ7aujW8l3JCQz6A:rVg5tQ7aujd7p5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-