General
-
Target
9973c59e706b46c794971eb91573633d8408ecba0cb58275e1c791b8a0bf04c3.exe
-
Size
484KB
-
Sample
241124-dgmeza1jgx
-
MD5
1772fa38d0a7ca65d6fdf06833f18341
-
SHA1
2b10988ce7b44ffcb1da9f0c6aadb4a7aba95075
-
SHA256
9973c59e706b46c794971eb91573633d8408ecba0cb58275e1c791b8a0bf04c3
-
SHA512
9d66e6cdcf7c715ad30a9ee5d6b138b39dbc7c86a250af7395a6be894fcec7457bd2585b17ceeae8dfb49bb32a82f71ab3e2516ff6c28aabaa5bc549d53502b3
-
SSDEEP
12288:0mky6kGLZ6suBxjiBeKa1iwclbx0KjlbnE7Nc:xxsUxj++1i7l+Nc
Static task
static1
Behavioral task
behavioral1
Sample
9973c59e706b46c794971eb91573633d8408ecba0cb58275e1c791b8a0bf04c3.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
9973c59e706b46c794971eb91573633d8408ecba0cb58275e1c791b8a0bf04c3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.penavico--cz.com - Port:
587 - Username:
[email protected] - Password:
Fq$L%J((!6
Targets
-
-
Target
9973c59e706b46c794971eb91573633d8408ecba0cb58275e1c791b8a0bf04c3.exe
-
Size
484KB
-
MD5
1772fa38d0a7ca65d6fdf06833f18341
-
SHA1
2b10988ce7b44ffcb1da9f0c6aadb4a7aba95075
-
SHA256
9973c59e706b46c794971eb91573633d8408ecba0cb58275e1c791b8a0bf04c3
-
SHA512
9d66e6cdcf7c715ad30a9ee5d6b138b39dbc7c86a250af7395a6be894fcec7457bd2585b17ceeae8dfb49bb32a82f71ab3e2516ff6c28aabaa5bc549d53502b3
-
SSDEEP
12288:0mky6kGLZ6suBxjiBeKa1iwclbx0KjlbnE7Nc:xxsUxj++1i7l+Nc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-