General
-
Target
044efcb8e9bdedf1a9046907cd116b59a26c7138c7fb07283660c45ec12ac180
-
Size
1.5MB
-
Sample
250109-btejsavkdq
-
MD5
6554dc7187e42f1681fe7b12644d2345
-
SHA1
d4c9d9f883f38e524c4ec1ee004653d47f0295f2
-
SHA256
044efcb8e9bdedf1a9046907cd116b59a26c7138c7fb07283660c45ec12ac180
-
SHA512
d7e1949a51e2f757f1d1576b41d0243aa44997fccc09b921eeea96a6a55749461d683b072a01530d3c9d1603b5e1adc8676cef7ed978a3899a51f24ea82b3ee3
-
SSDEEP
24576:A6MTTg+A8MO1v9r5SBseJiO1sv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:A6MTmOZV5AjJiNjLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
044efcb8e9bdedf1a9046907cd116b59a26c7138c7fb07283660c45ec12ac180.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
044efcb8e9bdedf1a9046907cd116b59a26c7138c7fb07283660c45ec12ac180.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.fardarlogistics.com - Port:
587 - Username:
[email protected] - Password:
fardar123
Extracted
agenttesla
Protocol: smtp- Host:
mail.fardarlogistics.com - Port:
587 - Username:
[email protected] - Password:
fardar123 - Email To:
[email protected]
Targets
-
-
Target
044efcb8e9bdedf1a9046907cd116b59a26c7138c7fb07283660c45ec12ac180
-
Size
1.5MB
-
MD5
6554dc7187e42f1681fe7b12644d2345
-
SHA1
d4c9d9f883f38e524c4ec1ee004653d47f0295f2
-
SHA256
044efcb8e9bdedf1a9046907cd116b59a26c7138c7fb07283660c45ec12ac180
-
SHA512
d7e1949a51e2f757f1d1576b41d0243aa44997fccc09b921eeea96a6a55749461d683b072a01530d3c9d1603b5e1adc8676cef7ed978a3899a51f24ea82b3ee3
-
SSDEEP
24576:A6MTTg+A8MO1v9r5SBseJiO1sv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:A6MTmOZV5AjJiNjLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-