General
-
Target
33eac721076c99a55758eae610f5a181346e9b378dc28ff9eb601d7e9ed55c23
-
Size
1.3MB
-
Sample
250114-b9ws1atjg1
-
MD5
3a5d6126fc6f8eb2a4120964d61c59db
-
SHA1
faf50512b6898bf7bd01483dbe275afbcc2e8c2d
-
SHA256
33eac721076c99a55758eae610f5a181346e9b378dc28ff9eb601d7e9ed55c23
-
SHA512
445d0ffaa74c7456d7ee77a18f03c67fcaa936a4840272daec3765a28b86371f6268679c77cfe9022ba598dbc25ab68af2643eb5dc3a9e33d32fbc1219c47760
-
SSDEEP
24576:OHj1M7H0FpYOyluYcDv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:O1A0pzxljLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
33eac721076c99a55758eae610f5a181346e9b378dc28ff9eb601d7e9ed55c23.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
33eac721076c99a55758eae610f5a181346e9b378dc28ff9eb601d7e9ed55c23.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.medicare-equipment.com - Port:
587 - Username:
[email protected] - Password:
AllTheBest777 - Email To:
[email protected]
Targets
-
-
Target
33eac721076c99a55758eae610f5a181346e9b378dc28ff9eb601d7e9ed55c23
-
Size
1.3MB
-
MD5
3a5d6126fc6f8eb2a4120964d61c59db
-
SHA1
faf50512b6898bf7bd01483dbe275afbcc2e8c2d
-
SHA256
33eac721076c99a55758eae610f5a181346e9b378dc28ff9eb601d7e9ed55c23
-
SHA512
445d0ffaa74c7456d7ee77a18f03c67fcaa936a4840272daec3765a28b86371f6268679c77cfe9022ba598dbc25ab68af2643eb5dc3a9e33d32fbc1219c47760
-
SSDEEP
24576:OHj1M7H0FpYOyluYcDv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:O1A0pzxljLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-