General
-
Target
6ca3198b4ef673ebb74d5d936de3a0a4ea7aa09bf6a4da147a40739857da07cb
-
Size
216KB
-
Sample
250111-byq4daxlcw
-
MD5
5d41cfbd1290457ff03c62a56a90d2c6
-
SHA1
72272bbbf691b35317073440451cbefd5a442de3
-
SHA256
6ca3198b4ef673ebb74d5d936de3a0a4ea7aa09bf6a4da147a40739857da07cb
-
SHA512
6dbf17f1009ed93411ace1edea9b409ee731739092ca14dd2a8a7fd9394b4c941a2d34842196512d4ab7f96bca6d394429ddad2c2884c2025e540ecd449c8765
-
SSDEEP
3072:FbIW3uII4She95fsbLGxZcl4AjYcHNhUixsQPWHCi7F1wmClcwID0kmkcLBUoAXn:TJZaAQUa+HXTq6IFUdIpPX
Behavioral task
behavioral1
Sample
6ca3198b4ef673ebb74d5d936de3a0a4ea7aa09bf6a4da147a40739857da07cb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6ca3198b4ef673ebb74d5d936de3a0a4ea7aa09bf6a4da147a40739857da07cb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.heidloph.com/ - Port:
21 - Username:
[email protected] - Password:
EUjZJ)6(1=CL
Targets
-
-
Target
6ca3198b4ef673ebb74d5d936de3a0a4ea7aa09bf6a4da147a40739857da07cb
-
Size
216KB
-
MD5
5d41cfbd1290457ff03c62a56a90d2c6
-
SHA1
72272bbbf691b35317073440451cbefd5a442de3
-
SHA256
6ca3198b4ef673ebb74d5d936de3a0a4ea7aa09bf6a4da147a40739857da07cb
-
SHA512
6dbf17f1009ed93411ace1edea9b409ee731739092ca14dd2a8a7fd9394b4c941a2d34842196512d4ab7f96bca6d394429ddad2c2884c2025e540ecd449c8765
-
SSDEEP
3072:FbIW3uII4She95fsbLGxZcl4AjYcHNhUixsQPWHCi7F1wmClcwID0kmkcLBUoAXn:TJZaAQUa+HXTq6IFUdIpPX
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-