General
-
Target
2111db91a743a246a30e482445bd2509828c78bd6a5756670ca2dd39cbc753c3
-
Size
523KB
-
Sample
241124-beyzwaskfl
-
MD5
0acad990ec85a2ace1651ef2a773d074
-
SHA1
c7cc8c7b6bb9e87c051312df76387922281247fa
-
SHA256
2111db91a743a246a30e482445bd2509828c78bd6a5756670ca2dd39cbc753c3
-
SHA512
c5707e6af2af62b0b5123483380e98947ebc5593e5175204b4383f54dab0f37883d7235ea5c97037cc26bf490f8df2afae025b15fe169ec6140225fe680a0fb8
-
SSDEEP
12288:gYcndtWt5LAiFl/rYCCZdd7Us9zue3o1MCksxfbyLJBJkolAgLV:gYcWtiijrYCCZdNUKzua+M7sxc
Static task
static1
Behavioral task
behavioral1
Sample
2111db91a743a246a30e482445bd2509828c78bd6a5756670ca2dd39cbc753c3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2111db91a743a246a30e482445bd2509828c78bd6a5756670ca2dd39cbc753c3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
darkeyedarkeye12
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
darkeyedarkeye12
Targets
-
-
Target
2111db91a743a246a30e482445bd2509828c78bd6a5756670ca2dd39cbc753c3
-
Size
523KB
-
MD5
0acad990ec85a2ace1651ef2a773d074
-
SHA1
c7cc8c7b6bb9e87c051312df76387922281247fa
-
SHA256
2111db91a743a246a30e482445bd2509828c78bd6a5756670ca2dd39cbc753c3
-
SHA512
c5707e6af2af62b0b5123483380e98947ebc5593e5175204b4383f54dab0f37883d7235ea5c97037cc26bf490f8df2afae025b15fe169ec6140225fe680a0fb8
-
SSDEEP
12288:gYcndtWt5LAiFl/rYCCZdd7Us9zue3o1MCksxfbyLJBJkolAgLV:gYcWtiijrYCCZdNUKzua+M7sxc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-