General
-
Target
ggg.exe
-
Size
952KB
-
Sample
200713-kdn8rlp7a6
-
MD5
7f8cd5575261264148b816ff4a359fed
-
SHA1
5e8196eefc34ee3facc368bcb3ffeaf5579cb856
-
SHA256
c1ac23cf47bac86cd0591532f7c76a813c12eb8a04cd93c474c821402d18972e
-
SHA512
bc046a7d11f577b2e7fd0109ee1fe738c21f2f8b6ad49cbcc24fb0db9ef1b606b3bc9c89397362f32fcd25218ac220055a7e2708d5db5e8f0e6d309323aa8e95
Static task
static1
Behavioral task
behavioral1
Sample
ggg.exe
Resource
win7
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.serviciocitroen.com - Port:
587 - Username:
[email protected] - Password:
FXO]%cdB8gx-
Targets
-
-
Target
ggg.exe
-
Size
952KB
-
MD5
7f8cd5575261264148b816ff4a359fed
-
SHA1
5e8196eefc34ee3facc368bcb3ffeaf5579cb856
-
SHA256
c1ac23cf47bac86cd0591532f7c76a813c12eb8a04cd93c474c821402d18972e
-
SHA512
bc046a7d11f577b2e7fd0109ee1fe738c21f2f8b6ad49cbcc24fb0db9ef1b606b3bc9c89397362f32fcd25218ac220055a7e2708d5db5e8f0e6d309323aa8e95
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-