General
-
Target
231307dcdf9a0fc4b7b34855e44b7218f582f49b16ddb4ad55fad063afa74f24
-
Size
4.7MB
-
Sample
250114-b3nttavrcr
-
MD5
6b4d9f1261c4f6e9323b9d2e74cd7b73
-
SHA1
0947ef1b7665232105e39da8074144eca780d98a
-
SHA256
231307dcdf9a0fc4b7b34855e44b7218f582f49b16ddb4ad55fad063afa74f24
-
SHA512
28f38ccf90ed368405fb204160a3648595d4c029fe6a319ead72a2d87d67b53403a63af0ef664a480de73ba013ee5f9d640cb3290d7f6aa20c19c61a48833ba6
-
SSDEEP
49152:j6oZF80z1e3Nuo5UonKzwjHP7iF0u3xl9hCY:vZFR1ykfoK8z7/aVD
Static task
static1
Behavioral task
behavioral1
Sample
231307dcdf9a0fc4b7b34855e44b7218f582f49b16ddb4ad55fad063afa74f24.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
231307dcdf9a0fc4b7b34855e44b7218f582f49b16ddb4ad55fad063afa74f24.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rapidmail.ec - Port:
587 - Username:
[email protected] - Password:
icui4cu2@@ - Email To:
[email protected]
Targets
-
-
Target
231307dcdf9a0fc4b7b34855e44b7218f582f49b16ddb4ad55fad063afa74f24
-
Size
4.7MB
-
MD5
6b4d9f1261c4f6e9323b9d2e74cd7b73
-
SHA1
0947ef1b7665232105e39da8074144eca780d98a
-
SHA256
231307dcdf9a0fc4b7b34855e44b7218f582f49b16ddb4ad55fad063afa74f24
-
SHA512
28f38ccf90ed368405fb204160a3648595d4c029fe6a319ead72a2d87d67b53403a63af0ef664a480de73ba013ee5f9d640cb3290d7f6aa20c19c61a48833ba6
-
SSDEEP
49152:j6oZF80z1e3Nuo5UonKzwjHP7iF0u3xl9hCY:vZFR1ykfoK8z7/aVD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-