General
-
Target
660d7109d6818a32151e558637f210ac477bb3edafc9ce5c382839afd88b0f1f
-
Size
1.8MB
-
Sample
250114-br1dgavnhj
-
MD5
acbcd0aff217bcd39ae04f6bcf033e0b
-
SHA1
4c72cc5252c1a9e1ba600c8f8aacfcf4da462f23
-
SHA256
660d7109d6818a32151e558637f210ac477bb3edafc9ce5c382839afd88b0f1f
-
SHA512
ca2e5db57cc310598aeb7832b3d184fbb86e91780b436d743e3f2e537c6982ef2d5178fad088f60ee0ca9009e16bee2c3da7a56b0d049d068e20808ff647a005
-
SSDEEP
49152:NJ4ZOp6gvGrXdDjqKoeajLoyEkmZ9Y14:AgvadDjqKoehA
Static task
static1
Behavioral task
behavioral1
Sample
660d7109d6818a32151e558637f210ac477bb3edafc9ce5c382839afd88b0f1f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
660d7109d6818a32151e558637f210ac477bb3edafc9ce5c382839afd88b0f1f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.redivieco.com - Port:
587 - Username:
[email protected] - Password:
Lzjyfk7BJy
Targets
-
-
Target
660d7109d6818a32151e558637f210ac477bb3edafc9ce5c382839afd88b0f1f
-
Size
1.8MB
-
MD5
acbcd0aff217bcd39ae04f6bcf033e0b
-
SHA1
4c72cc5252c1a9e1ba600c8f8aacfcf4da462f23
-
SHA256
660d7109d6818a32151e558637f210ac477bb3edafc9ce5c382839afd88b0f1f
-
SHA512
ca2e5db57cc310598aeb7832b3d184fbb86e91780b436d743e3f2e537c6982ef2d5178fad088f60ee0ca9009e16bee2c3da7a56b0d049d068e20808ff647a005
-
SSDEEP
49152:NJ4ZOp6gvGrXdDjqKoeajLoyEkmZ9Y14:AgvadDjqKoehA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-