General
-
Target
aeb274a905a71647f95612a93eefcaaaefaa05ac1248f4b45603718f03b0095f
-
Size
577KB
-
Sample
250110-bssp1syran
-
MD5
d0533486e3a57a0aff15c66502638175
-
SHA1
489856b45bc7128078caec7a398966c674b049d5
-
SHA256
aeb274a905a71647f95612a93eefcaaaefaa05ac1248f4b45603718f03b0095f
-
SHA512
8a4b85441b2747cd27993764f3fc75605f837a78f4b303eab748cfa29519dd6fc008cd8468e10a01dada5fa26d7a8fe7bc0e932badf897aa3e44f9a4185b80fe
-
SSDEEP
12288:qtA16gb1PK2iNqw/NsIiuYwFutKxzpBVGJ/stty:qzMK17/2fuYxtys/st
Static task
static1
Behavioral task
behavioral1
Sample
aeb274a905a71647f95612a93eefcaaaefaa05ac1248f4b45603718f03b0095f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aeb274a905a71647f95612a93eefcaaaefaa05ac1248f4b45603718f03b0095f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.flood-protection.org - Port:
587 - Username:
[email protected] - Password:
success2424@
Targets
-
-
Target
aeb274a905a71647f95612a93eefcaaaefaa05ac1248f4b45603718f03b0095f
-
Size
577KB
-
MD5
d0533486e3a57a0aff15c66502638175
-
SHA1
489856b45bc7128078caec7a398966c674b049d5
-
SHA256
aeb274a905a71647f95612a93eefcaaaefaa05ac1248f4b45603718f03b0095f
-
SHA512
8a4b85441b2747cd27993764f3fc75605f837a78f4b303eab748cfa29519dd6fc008cd8468e10a01dada5fa26d7a8fe7bc0e932badf897aa3e44f9a4185b80fe
-
SSDEEP
12288:qtA16gb1PK2iNqw/NsIiuYwFutKxzpBVGJ/stty:qzMK17/2fuYxtys/st
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-