General
-
Target
23642e49df2c9995118b5eb4b16a839a4ee293d923971c068d851f3beb15a98c
-
Size
1.5MB
-
Sample
250110-b2jhpsxmat
-
MD5
c0b528f14bcbbbb8f4aed47f5def45ed
-
SHA1
2da65e0d0dda6a3df6086ac5716c3749f7e01072
-
SHA256
23642e49df2c9995118b5eb4b16a839a4ee293d923971c068d851f3beb15a98c
-
SHA512
571c17cda484d8744cff5c03d7ad823da5c26c562c34e50fdaabdd68b7a18ca11332c71fdb00e56d247aac3d74609c0cee2773cb3f5d3ca827eeecb82237a71a
-
SSDEEP
24576:/CtyWSC/ujRD2YELftSzrEwWvdSv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:/CLc3EAgwWFajLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
23642e49df2c9995118b5eb4b16a839a4ee293d923971c068d851f3beb15a98c.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gemsaboya.com - Port:
587 - Username:
[email protected] - Password:
TgJ&q4C*dW.p - Email To:
[email protected]
Targets
-
-
Target
23642e49df2c9995118b5eb4b16a839a4ee293d923971c068d851f3beb15a98c
-
Size
1.5MB
-
MD5
c0b528f14bcbbbb8f4aed47f5def45ed
-
SHA1
2da65e0d0dda6a3df6086ac5716c3749f7e01072
-
SHA256
23642e49df2c9995118b5eb4b16a839a4ee293d923971c068d851f3beb15a98c
-
SHA512
571c17cda484d8744cff5c03d7ad823da5c26c562c34e50fdaabdd68b7a18ca11332c71fdb00e56d247aac3d74609c0cee2773cb3f5d3ca827eeecb82237a71a
-
SSDEEP
24576:/CtyWSC/ujRD2YELftSzrEwWvdSv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:/CLc3EAgwWFajLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1