General
-
Target
7458f31fbf422f84810586fb736261b52c2ced7207c9055e22e1bdb7f1d04848
-
Size
1.5MB
-
Sample
250114-b6kxbsvrhr
-
MD5
4212dd2aaf1b4a9676b27d280273db44
-
SHA1
41dca2b1f0a2450e773ea98f1427e5fd78905fb5
-
SHA256
7458f31fbf422f84810586fb736261b52c2ced7207c9055e22e1bdb7f1d04848
-
SHA512
bfd88210e6103b1ddb89900bb6baa74d3a76c43b2510bd541d932f6808fdcad77cdcf12a1475a1b47a32359166c17e8c9c62d32f986e9fc21aa290456a3dcaf2
-
SSDEEP
24576:y/FH/8izXYKTjkr1CrMGy+mGQOsXv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:y/FH/8yXYKyRSmGEjLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
7458f31fbf422f84810586fb736261b52c2ced7207c9055e22e1bdb7f1d04848.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7458f31fbf422f84810586fb736261b52c2ced7207c9055e22e1bdb7f1d04848.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.alumisr.com - Port:
587 - Username:
[email protected] - Password:
*Eg_alpr_SL@77*79#
Extracted
agenttesla
Protocol: smtp- Host:
mail.alumisr.com - Port:
587 - Username:
[email protected] - Password:
*Eg_alpr_SL@77*79# - Email To:
[email protected]
Targets
-
-
Target
7458f31fbf422f84810586fb736261b52c2ced7207c9055e22e1bdb7f1d04848
-
Size
1.5MB
-
MD5
4212dd2aaf1b4a9676b27d280273db44
-
SHA1
41dca2b1f0a2450e773ea98f1427e5fd78905fb5
-
SHA256
7458f31fbf422f84810586fb736261b52c2ced7207c9055e22e1bdb7f1d04848
-
SHA512
bfd88210e6103b1ddb89900bb6baa74d3a76c43b2510bd541d932f6808fdcad77cdcf12a1475a1b47a32359166c17e8c9c62d32f986e9fc21aa290456a3dcaf2
-
SSDEEP
24576:y/FH/8izXYKTjkr1CrMGy+mGQOsXv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:y/FH/8yXYKyRSmGEjLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-