General
-
Target
b002f7e0c7ef00b3f027dd0fe01baa1ce2e7d945db64be53ffc550ada8287cfc.exe
-
Size
609KB
-
Sample
241123-zpsslswkes
-
MD5
5ecdd087c3f454732c6005be857e46a3
-
SHA1
aa5b4890fdfd8ae41ee746fcea9633ab4a676fad
-
SHA256
b002f7e0c7ef00b3f027dd0fe01baa1ce2e7d945db64be53ffc550ada8287cfc
-
SHA512
4b369346f3b2a1f597b447c54b6a7e76a3e7ad40c1191d089c3ebbfedee92df149254b719b8c6515821bd534416be141ba70625398f52a4a2d6619d8d878d8be
-
SSDEEP
12288:niBlqpUExmIshw7qf49AqIZeCtFXdWJ9didSBLQpFvkNgNCcM:niBlqppchYqg98ltFNcqQBL0k6q
Static task
static1
Behavioral task
behavioral1
Sample
b002f7e0c7ef00b3f027dd0fe01baa1ce2e7d945db64be53ffc550ada8287cfc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b002f7e0c7ef00b3f027dd0fe01baa1ce2e7d945db64be53ffc550ada8287cfc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dm-teh.com - Port:
587 - Username:
[email protected] - Password:
Vm@(O;CO.vEQ - Email To:
[email protected]
Targets
-
-
Target
b002f7e0c7ef00b3f027dd0fe01baa1ce2e7d945db64be53ffc550ada8287cfc.exe
-
Size
609KB
-
MD5
5ecdd087c3f454732c6005be857e46a3
-
SHA1
aa5b4890fdfd8ae41ee746fcea9633ab4a676fad
-
SHA256
b002f7e0c7ef00b3f027dd0fe01baa1ce2e7d945db64be53ffc550ada8287cfc
-
SHA512
4b369346f3b2a1f597b447c54b6a7e76a3e7ad40c1191d089c3ebbfedee92df149254b719b8c6515821bd534416be141ba70625398f52a4a2d6619d8d878d8be
-
SSDEEP
12288:niBlqpUExmIshw7qf49AqIZeCtFXdWJ9didSBLQpFvkNgNCcM:niBlqppchYqg98ltFNcqQBL0k6q
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-