General
-
Target
41ec6b417334c3ff3ca463a94461da1956f917deed3cf54956c90e7a3a855346
-
Size
479KB
-
Sample
250105-b39raaxjev
-
MD5
277517f5732163ee7a7b14a4c30f5795
-
SHA1
17895100ec88846c3ca8817c07bfdf8d4fe52154
-
SHA256
41ec6b417334c3ff3ca463a94461da1956f917deed3cf54956c90e7a3a855346
-
SHA512
1e623099cc3a78453bb8a49fe894af9975767c268807699fd856b5f12e3ea682cc717114cdac0f83bd1443d94207da59aa50e78ac4e8269716d3a1100cbd2b92
-
SSDEEP
12288:phCIyo8Y0/7CC0NWL169b1CazZXfb/Kl3G5FMTr:phg40CCOWR69bTZXfG38Mn
Static task
static1
Behavioral task
behavioral1
Sample
41ec6b417334c3ff3ca463a94461da1956f917deed3cf54956c90e7a3a855346.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41ec6b417334c3ff3ca463a94461da1956f917deed3cf54956c90e7a3a855346.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.mail.ru - Port:
587 - Username:
[email protected] - Password:
Kalisvicjic12449dd331
Targets
-
-
Target
41ec6b417334c3ff3ca463a94461da1956f917deed3cf54956c90e7a3a855346
-
Size
479KB
-
MD5
277517f5732163ee7a7b14a4c30f5795
-
SHA1
17895100ec88846c3ca8817c07bfdf8d4fe52154
-
SHA256
41ec6b417334c3ff3ca463a94461da1956f917deed3cf54956c90e7a3a855346
-
SHA512
1e623099cc3a78453bb8a49fe894af9975767c268807699fd856b5f12e3ea682cc717114cdac0f83bd1443d94207da59aa50e78ac4e8269716d3a1100cbd2b92
-
SSDEEP
12288:phCIyo8Y0/7CC0NWL169b1CazZXfb/Kl3G5FMTr:phg40CCOWR69bTZXfG38Mn
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-