General
-
Target
a1c60885f555dcb04bb6e744ad8460df805cd24d8c1253d744303871588f35cc
-
Size
1.5MB
-
Sample
250109-bq19davjbq
-
MD5
e2d51b290a3c9310e699058c6494c2d9
-
SHA1
bdf5ac5377b6d5cc4a69692919feac7b80c4c6ba
-
SHA256
a1c60885f555dcb04bb6e744ad8460df805cd24d8c1253d744303871588f35cc
-
SHA512
f939d65f4a2f7c1fa366f99344bc3df55022d28af94a8216cb1e5ef040ccce33c92925702476a5648798b2b9efa102384940bb62878b39531c3fd164ae33d749
-
SSDEEP
24576:XHWXF343sJPeOe175LvE7v1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:cFo8Jl7tjLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
a1c60885f555dcb04bb6e744ad8460df805cd24d8c1253d744303871588f35cc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a1c60885f555dcb04bb6e744ad8460df805cd24d8c1253d744303871588f35cc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.lokalboyz.com - Port:
587 - Username:
[email protected] - Password:
Gllm9vjy
Targets
-
-
Target
a1c60885f555dcb04bb6e744ad8460df805cd24d8c1253d744303871588f35cc
-
Size
1.5MB
-
MD5
e2d51b290a3c9310e699058c6494c2d9
-
SHA1
bdf5ac5377b6d5cc4a69692919feac7b80c4c6ba
-
SHA256
a1c60885f555dcb04bb6e744ad8460df805cd24d8c1253d744303871588f35cc
-
SHA512
f939d65f4a2f7c1fa366f99344bc3df55022d28af94a8216cb1e5ef040ccce33c92925702476a5648798b2b9efa102384940bb62878b39531c3fd164ae33d749
-
SSDEEP
24576:XHWXF343sJPeOe175LvE7v1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:cFo8Jl7tjLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-