General
-
Target
21b7ff01ef738f027f903bf46b3515ce7e505dfe46e42e0d693399e6f23a4769
-
Size
1.3MB
-
Sample
241122-y9531aykdv
-
MD5
4a0719ed59454a34f7e31cfeead5b604
-
SHA1
f3fe5ed9d9328ddcac6ffd695aef28575bf4a7fa
-
SHA256
21b7ff01ef738f027f903bf46b3515ce7e505dfe46e42e0d693399e6f23a4769
-
SHA512
0262491c8ab14b2b8fe8e31bb937a0c5f10ab05750fcfebb8890081bca7d3fbfa9c0595e5e24921e62a33a8d03c253bb64aa2804c95d250cba09b4cd4cd4d729
-
SSDEEP
12288:+bXqDt5We1yRFKMM1zvueoRUg+82O/GYahbAihO1c++YyHR8S8:+Ot5DyR5Qv+Ug+82OhahbAipHR8L
Static task
static1
Behavioral task
behavioral1
Sample
21b7ff01ef738f027f903bf46b3515ce7e505dfe46e42e0d693399e6f23a4769.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
21b7ff01ef738f027f903bf46b3515ce7e505dfe46e42e0d693399e6f23a4769.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.1and1.es - Port:
587 - Username:
[email protected] - Password:
qWa8u9_2
Targets
-
-
Target
21b7ff01ef738f027f903bf46b3515ce7e505dfe46e42e0d693399e6f23a4769
-
Size
1.3MB
-
MD5
4a0719ed59454a34f7e31cfeead5b604
-
SHA1
f3fe5ed9d9328ddcac6ffd695aef28575bf4a7fa
-
SHA256
21b7ff01ef738f027f903bf46b3515ce7e505dfe46e42e0d693399e6f23a4769
-
SHA512
0262491c8ab14b2b8fe8e31bb937a0c5f10ab05750fcfebb8890081bca7d3fbfa9c0595e5e24921e62a33a8d03c253bb64aa2804c95d250cba09b4cd4cd4d729
-
SSDEEP
12288:+bXqDt5We1yRFKMM1zvueoRUg+82O/GYahbAihO1c++YyHR8S8:+Ot5DyR5Qv+Ug+82OhahbAipHR8L
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-