General
-
Target
bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29
-
Size
3.4MB
-
Sample
250114-b57ppssrhs
-
MD5
f5f811e6fb7870b544f73b1c7e1592d1
-
SHA1
d0191c810c6fe865a303cfa5dcc91ce7b29008f5
-
SHA256
bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29
-
SHA512
ed36a5220140f7eea7429bdc40a4ca3d68032016783fcc468eb486b55f4d9fb49fb9d3b6b9cc91dae17cd2b8bfda818fd3381b73e87df99cc255c7e412df7fc2
-
SSDEEP
49152:h/y6lbG5Ak3fVEdBr1OEFGwtnym/ifzKzCjLoyEkmZ9Y14X:h05Aq9ir1OEFGwtnymKLKzJAu
Static task
static1
Behavioral task
behavioral1
Sample
bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
myhp6000
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
myhp6000
Targets
-
-
Target
bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29
-
Size
3.4MB
-
MD5
f5f811e6fb7870b544f73b1c7e1592d1
-
SHA1
d0191c810c6fe865a303cfa5dcc91ce7b29008f5
-
SHA256
bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29
-
SHA512
ed36a5220140f7eea7429bdc40a4ca3d68032016783fcc468eb486b55f4d9fb49fb9d3b6b9cc91dae17cd2b8bfda818fd3381b73e87df99cc255c7e412df7fc2
-
SSDEEP
49152:h/y6lbG5Ak3fVEdBr1OEFGwtnym/ifzKzCjLoyEkmZ9Y14X:h05Aq9ir1OEFGwtnymKLKzJAu
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-