General
-
Target
66d55aed217ab100b55b3a975cdc89cce644c32f3d27cc202f68b3404b67c53e
-
Size
1.4MB
-
Sample
250114-b3ssrssrcv
-
MD5
81b6c3bc8ffb62a5301ae6a3fe7298e5
-
SHA1
2e4dccda2cacb626fe0fb511a942692ffb949789
-
SHA256
66d55aed217ab100b55b3a975cdc89cce644c32f3d27cc202f68b3404b67c53e
-
SHA512
6eeed543341a7430b8104eeeef271cf95cf4897c8d6488c06da6ab6d6118d31f9653998b52105f3af4d98543f7c8fa5a0218bbd993dc0da012396bba33fb908a
-
SSDEEP
24576:Z+kwnmSMDo5tW0ak+9BVaFcfv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:ZBwnZMOaxOSJjLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
66d55aed217ab100b55b3a975cdc89cce644c32f3d27cc202f68b3404b67c53e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
66d55aed217ab100b55b3a975cdc89cce644c32f3d27cc202f68b3404b67c53e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.exportersglobe.com - Port:
587 - Username:
[email protected] - Password:
MnmPsqBteq4_ - Email To:
[email protected]
Targets
-
-
Target
66d55aed217ab100b55b3a975cdc89cce644c32f3d27cc202f68b3404b67c53e
-
Size
1.4MB
-
MD5
81b6c3bc8ffb62a5301ae6a3fe7298e5
-
SHA1
2e4dccda2cacb626fe0fb511a942692ffb949789
-
SHA256
66d55aed217ab100b55b3a975cdc89cce644c32f3d27cc202f68b3404b67c53e
-
SHA512
6eeed543341a7430b8104eeeef271cf95cf4897c8d6488c06da6ab6d6118d31f9653998b52105f3af4d98543f7c8fa5a0218bbd993dc0da012396bba33fb908a
-
SSDEEP
24576:Z+kwnmSMDo5tW0ak+9BVaFcfv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:ZBwnZMOaxOSJjLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-