General
-
Target
f09814715a247c4a93532cc3aa8ecf108c55494a6b32cbe7dfb424792d1ad33e
-
Size
1.4MB
-
Sample
250114-cdeehstkey
-
MD5
633134941eda076fd3c6f24770b168d1
-
SHA1
a8241a8b1060a4f645f080a3ede8be6a14d35862
-
SHA256
f09814715a247c4a93532cc3aa8ecf108c55494a6b32cbe7dfb424792d1ad33e
-
SHA512
2695dac5d55300e1e2f5cc9c0506de27281010f9fd7a36b3a344436330e517a02de79b2fd743cc13c51560d789f2167b9ff89069139d8fa1aaf394ce6000ff8d
-
SSDEEP
24576:lanmoB/IJHXop81q1v1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:laVImpVzjLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
f09814715a247c4a93532cc3aa8ecf108c55494a6b32cbe7dfb424792d1ad33e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f09814715a247c4a93532cc3aa8ecf108c55494a6b32cbe7dfb424792d1ad33e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
41k2c4yfVG
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
41k2c4yfVG
Targets
-
-
Target
f09814715a247c4a93532cc3aa8ecf108c55494a6b32cbe7dfb424792d1ad33e
-
Size
1.4MB
-
MD5
633134941eda076fd3c6f24770b168d1
-
SHA1
a8241a8b1060a4f645f080a3ede8be6a14d35862
-
SHA256
f09814715a247c4a93532cc3aa8ecf108c55494a6b32cbe7dfb424792d1ad33e
-
SHA512
2695dac5d55300e1e2f5cc9c0506de27281010f9fd7a36b3a344436330e517a02de79b2fd743cc13c51560d789f2167b9ff89069139d8fa1aaf394ce6000ff8d
-
SSDEEP
24576:lanmoB/IJHXop81q1v1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:laVImpVzjLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-