General
-
Target
4d423e780034b102116860e978c415b94b6c416b89044c4c48f61a7a724dfba0
-
Size
1.6MB
-
Sample
250109-btejsavkdr
-
MD5
13a87cc84cb44db1ea375622beac7ccc
-
SHA1
fcde75a1f9bc26094c4c980a6994a138f79612c5
-
SHA256
4d423e780034b102116860e978c415b94b6c416b89044c4c48f61a7a724dfba0
-
SHA512
0af33aa92183f20c1fcf6a1b7121e7f2c75ca1d690dbbc92f2e8fdbd34405aa6f615106e7e893485aa3c50ae5a05e835ed155826200cf2203f14af4d7dcd3c32
-
SSDEEP
24576:GiA7rSMJpgz9+2iPCipQTv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:Gi+eApgzQLgjLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
4d423e780034b102116860e978c415b94b6c416b89044c4c48f61a7a724dfba0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4d423e780034b102116860e978c415b94b6c416b89044c4c48f61a7a724dfba0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.framafilms.com - Port:
587 - Username:
[email protected] - Password:
lister11
Targets
-
-
Target
4d423e780034b102116860e978c415b94b6c416b89044c4c48f61a7a724dfba0
-
Size
1.6MB
-
MD5
13a87cc84cb44db1ea375622beac7ccc
-
SHA1
fcde75a1f9bc26094c4c980a6994a138f79612c5
-
SHA256
4d423e780034b102116860e978c415b94b6c416b89044c4c48f61a7a724dfba0
-
SHA512
0af33aa92183f20c1fcf6a1b7121e7f2c75ca1d690dbbc92f2e8fdbd34405aa6f615106e7e893485aa3c50ae5a05e835ed155826200cf2203f14af4d7dcd3c32
-
SSDEEP
24576:GiA7rSMJpgz9+2iPCipQTv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:Gi+eApgzQLgjLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-