General
-
Target
(revised 01).exe
-
Size
937KB
-
Sample
221014-ng5awsdaem
-
MD5
91767f2a11feeb8f6679f55eb2fa5fc1
-
SHA1
295c233b415696dc23a10b0b492c66497aa99820
-
SHA256
ab828ebbb7925536f94b2fe3f34100bdc8326589deb88e90dd3490893495f19c
-
SHA512
802f3eca5c7b0f82a4ce55c51c33edd92749b713256cc1f0f6ff9f467b3dd6f55f1a7bc639266fe885c057db1198dad99a6cb829c1b3e40a16b74650fa21ecce
-
SSDEEP
12288:V97M2/1rXIkdhKQ4RBPeNpgGpG6jXHpdH3Zs02DIIDHJ38zc83Q9XCPB7ZbNw+sM:VZJdhKdIpgsLj/x
Static task
static1
Behavioral task
behavioral1
Sample
(revised 01).exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
(revised 01).exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
host12.registrar-servers.com - Port:
587 - Username:
[email protected] - Password:
project2022blessing
Targets
-
-
Target
(revised 01).exe
-
Size
937KB
-
MD5
91767f2a11feeb8f6679f55eb2fa5fc1
-
SHA1
295c233b415696dc23a10b0b492c66497aa99820
-
SHA256
ab828ebbb7925536f94b2fe3f34100bdc8326589deb88e90dd3490893495f19c
-
SHA512
802f3eca5c7b0f82a4ce55c51c33edd92749b713256cc1f0f6ff9f467b3dd6f55f1a7bc639266fe885c057db1198dad99a6cb829c1b3e40a16b74650fa21ecce
-
SSDEEP
12288:V97M2/1rXIkdhKQ4RBPeNpgGpG6jXHpdH3Zs02DIIDHJ38zc83Q9XCPB7ZbNw+sM:VZJdhKdIpgsLj/x
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-