General
-
Target
0fde8df8fa14228584159c113a84c785d96225ceddb92e658b3cf04ffb168500
-
Size
1.5MB
-
Sample
250114-b35gkasrdt
-
MD5
8bade73e6bc4cb1ef891146a69f22b36
-
SHA1
102937faaccf70efc797e3ec3bd228d117f92903
-
SHA256
0fde8df8fa14228584159c113a84c785d96225ceddb92e658b3cf04ffb168500
-
SHA512
8e0db77029f327e73639d0727bbfde18355c428a02c06c91f9815e4c13f50b7b83308a40043e3d711a0d431bf58a468b6534fa8e0ea96dbd7fd808447b010477
-
SSDEEP
24576:Nm3igHnIjT5DfT7UTc5BZGvToCKk3Cv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:snIV77MuCTopjLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
0fde8df8fa14228584159c113a84c785d96225ceddb92e658b3cf04ffb168500.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0fde8df8fa14228584159c113a84c785d96225ceddb92e658b3cf04ffb168500.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.hongdibrekes.com - Port:
587 - Username:
[email protected] - Password:
VGeRf%n0
Targets
-
-
Target
0fde8df8fa14228584159c113a84c785d96225ceddb92e658b3cf04ffb168500
-
Size
1.5MB
-
MD5
8bade73e6bc4cb1ef891146a69f22b36
-
SHA1
102937faaccf70efc797e3ec3bd228d117f92903
-
SHA256
0fde8df8fa14228584159c113a84c785d96225ceddb92e658b3cf04ffb168500
-
SHA512
8e0db77029f327e73639d0727bbfde18355c428a02c06c91f9815e4c13f50b7b83308a40043e3d711a0d431bf58a468b6534fa8e0ea96dbd7fd808447b010477
-
SSDEEP
24576:Nm3igHnIjT5DfT7UTc5BZGvToCKk3Cv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:snIV77MuCTopjLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-