General
-
Target
998c57b3ac3fb5ac49f307f56656e8379f8f7ca680e8a6e5b69029d6ccebffe2
-
Size
1.6MB
-
Sample
250114-cgf3hswlak
-
MD5
5d682bef54e8edf6f8be2594112f327b
-
SHA1
4927f0fbfc09243506636aeee50796c78040b579
-
SHA256
998c57b3ac3fb5ac49f307f56656e8379f8f7ca680e8a6e5b69029d6ccebffe2
-
SHA512
0e63dec4126dc32c2b601506498ff8613fe511708834851ac3d09813bc22cffa1ecdaa1787e54c290aeb87ee020fcc6859001a5b8c25f622a785abc3eeac124b
-
SSDEEP
49152:Iu0c++OCvkGs9FaUq1vaNfQx9EA4GDFtmhEdwkD2Y:/B3vkJ9WSNfQx9EA4oeedwkD2
Static task
static1
Behavioral task
behavioral1
Sample
998c57b3ac3fb5ac49f307f56656e8379f8f7ca680e8a6e5b69029d6ccebffe2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
998c57b3ac3fb5ac49f307f56656e8379f8f7ca680e8a6e5b69029d6ccebffe2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dormakeba.com - Port:
587 - Username:
[email protected] - Password:
goodnews0806658
Targets
-
-
Target
998c57b3ac3fb5ac49f307f56656e8379f8f7ca680e8a6e5b69029d6ccebffe2
-
Size
1.6MB
-
MD5
5d682bef54e8edf6f8be2594112f327b
-
SHA1
4927f0fbfc09243506636aeee50796c78040b579
-
SHA256
998c57b3ac3fb5ac49f307f56656e8379f8f7ca680e8a6e5b69029d6ccebffe2
-
SHA512
0e63dec4126dc32c2b601506498ff8613fe511708834851ac3d09813bc22cffa1ecdaa1787e54c290aeb87ee020fcc6859001a5b8c25f622a785abc3eeac124b
-
SSDEEP
49152:Iu0c++OCvkGs9FaUq1vaNfQx9EA4GDFtmhEdwkD2Y:/B3vkJ9WSNfQx9EA4oeedwkD2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-