General
-
Target
3fbe38b197d40c0e964e109eccad4844941bc66f1c8aef62acdbe1a5ff92d58c
-
Size
1.4MB
-
Sample
250112-bhbzhszpcl
-
MD5
7609d3f5cd98e9e9107e1780326d0dcd
-
SHA1
fe3678c2539ce5894c41e4f6a7e3a8eb4a0cd5eb
-
SHA256
3fbe38b197d40c0e964e109eccad4844941bc66f1c8aef62acdbe1a5ff92d58c
-
SHA512
6f4dc2a36666b3c1661a7d95e4701c54ce0d7959fe9555bdb0f39b21ba8ea90a92a177f5a5784485bf5858021378926de291bf3448fa1c9c636c74ba76903f3e
-
SSDEEP
24576:yybPlTwAXJcF4ntRCriCbLv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:yiT9XJRAbdjLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
3fbe38b197d40c0e964e109eccad4844941bc66f1c8aef62acdbe1a5ff92d58c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3fbe38b197d40c0e964e109eccad4844941bc66f1c8aef62acdbe1a5ff92d58c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.realforceshipping.com - Port:
587 - Username:
[email protected] - Password:
Wegood2018
Extracted
agenttesla
Protocol: smtp- Host:
mail.realforceshipping.com - Port:
587 - Username:
[email protected] - Password:
Wegood2018 - Email To:
[email protected]
Targets
-
-
Target
3fbe38b197d40c0e964e109eccad4844941bc66f1c8aef62acdbe1a5ff92d58c
-
Size
1.4MB
-
MD5
7609d3f5cd98e9e9107e1780326d0dcd
-
SHA1
fe3678c2539ce5894c41e4f6a7e3a8eb4a0cd5eb
-
SHA256
3fbe38b197d40c0e964e109eccad4844941bc66f1c8aef62acdbe1a5ff92d58c
-
SHA512
6f4dc2a36666b3c1661a7d95e4701c54ce0d7959fe9555bdb0f39b21ba8ea90a92a177f5a5784485bf5858021378926de291bf3448fa1c9c636c74ba76903f3e
-
SSDEEP
24576:yybPlTwAXJcF4ntRCriCbLv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:yiT9XJRAbdjLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-