General
-
Target
2e99a41433e165bc180c180f453c4256cdfd95fda70b311f63fc781826b613cf
-
Size
1.6MB
-
Sample
250114-b8jr2stjdz
-
MD5
ceebbd1725b88477007312a43545448d
-
SHA1
3a8db5d19e61ae72bd970462b890f513bfb8cd38
-
SHA256
2e99a41433e165bc180c180f453c4256cdfd95fda70b311f63fc781826b613cf
-
SHA512
f6f01b6942644b848406ebab41ffed40185045d019ec23ae9db4c1b884c83b9981088dd008ab46521de53a2e0c0080015272788db46f986127d7912e496251fe
-
SSDEEP
24576:ulZmpmisyA5I7MY4tQdEz9xcv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:eyAS5wTxxAjLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
2e99a41433e165bc180c180f453c4256cdfd95fda70b311f63fc781826b613cf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e99a41433e165bc180c180f453c4256cdfd95fda70b311f63fc781826b613cf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.alwarabottles.com - Port:
587 - Username:
[email protected] - Password:
@@operations@@ - Email To:
[email protected]
Targets
-
-
Target
2e99a41433e165bc180c180f453c4256cdfd95fda70b311f63fc781826b613cf
-
Size
1.6MB
-
MD5
ceebbd1725b88477007312a43545448d
-
SHA1
3a8db5d19e61ae72bd970462b890f513bfb8cd38
-
SHA256
2e99a41433e165bc180c180f453c4256cdfd95fda70b311f63fc781826b613cf
-
SHA512
f6f01b6942644b848406ebab41ffed40185045d019ec23ae9db4c1b884c83b9981088dd008ab46521de53a2e0c0080015272788db46f986127d7912e496251fe
-
SSDEEP
24576:ulZmpmisyA5I7MY4tQdEz9xcv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:eyAS5wTxxAjLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-