General
-
Target
a4dcfe18804bf673a680beb541520103afa18564eef63649ec9c36659e682fe1
-
Size
1.5MB
-
Sample
250112-brgw5a1kdp
-
MD5
1ca6af379c0214866c0dc1dd663e5f14
-
SHA1
1aa241cfdc34856c9a97432659a8b7b0148a5968
-
SHA256
a4dcfe18804bf673a680beb541520103afa18564eef63649ec9c36659e682fe1
-
SHA512
eb89d99d47a816b4cd3ca6242d9871ee4b82a8a7e2e6dca6a8b1745513eddd42c8473a4ff88eb9d718e0effbc47538162c9d8c45c2abc38df3c84866cc7b772e
-
SSDEEP
24576:ib+9LvAxdmbmo8LQlXZuhnsqXzZv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:i4vAxMmoNunTDPjLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
a4dcfe18804bf673a680beb541520103afa18564eef63649ec9c36659e682fe1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a4dcfe18804bf673a680beb541520103afa18564eef63649ec9c36659e682fe1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.syntrnomh.com - Port:
587 - Username:
[email protected] - Password:
Tdn$AuZro1
Targets
-
-
Target
a4dcfe18804bf673a680beb541520103afa18564eef63649ec9c36659e682fe1
-
Size
1.5MB
-
MD5
1ca6af379c0214866c0dc1dd663e5f14
-
SHA1
1aa241cfdc34856c9a97432659a8b7b0148a5968
-
SHA256
a4dcfe18804bf673a680beb541520103afa18564eef63649ec9c36659e682fe1
-
SHA512
eb89d99d47a816b4cd3ca6242d9871ee4b82a8a7e2e6dca6a8b1745513eddd42c8473a4ff88eb9d718e0effbc47538162c9d8c45c2abc38df3c84866cc7b772e
-
SSDEEP
24576:ib+9LvAxdmbmo8LQlXZuhnsqXzZv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:i4vAxMmoNunTDPjLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-