General
-
Target
39bf46a3d82dc2ab2a413dbc199ac3eb1c15014ad8c3171d2efc6af9c409d0be
-
Size
1.3MB
-
Sample
250114-b9ws1atjhs
-
MD5
3eefac0ac4debdfa45f3ea5b9b003022
-
SHA1
ab0f47cd58b54d235deb92c55acbf0e34d605916
-
SHA256
39bf46a3d82dc2ab2a413dbc199ac3eb1c15014ad8c3171d2efc6af9c409d0be
-
SHA512
b61c9b6c7dcf21da4869cc7ce75088a381c8db7c22fa675969ac0b78b0ac8bc728725ce07c35af7c1ab71aa6d144d43f82a8bfb341553dcebdab728c7d76a24e
-
SSDEEP
24576:IFOudyObqWcuAA0EHJbdRRv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:3O+eSijLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
39bf46a3d82dc2ab2a413dbc199ac3eb1c15014ad8c3171d2efc6af9c409d0be.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39bf46a3d82dc2ab2a413dbc199ac3eb1c15014ad8c3171d2efc6af9c409d0be.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.maviksel.com - Port:
587 - Username:
[email protected] - Password:
Ravi/1970 - Email To:
[email protected]
Targets
-
-
Target
39bf46a3d82dc2ab2a413dbc199ac3eb1c15014ad8c3171d2efc6af9c409d0be
-
Size
1.3MB
-
MD5
3eefac0ac4debdfa45f3ea5b9b003022
-
SHA1
ab0f47cd58b54d235deb92c55acbf0e34d605916
-
SHA256
39bf46a3d82dc2ab2a413dbc199ac3eb1c15014ad8c3171d2efc6af9c409d0be
-
SHA512
b61c9b6c7dcf21da4869cc7ce75088a381c8db7c22fa675969ac0b78b0ac8bc728725ce07c35af7c1ab71aa6d144d43f82a8bfb341553dcebdab728c7d76a24e
-
SSDEEP
24576:IFOudyObqWcuAA0EHJbdRRv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:3O+eSijLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-