General
-
Target
file.exe
-
Size
1.2MB
-
Sample
221123-sn1y9seh6s
-
MD5
b0683925365bc31d28e77520b55a6175
-
SHA1
2ce8ad01ee917b1307eb706b33fcc7af7276612e
-
SHA256
675e5a2d1850dbf2fd2a6e99bc566e717a3b2221c7fe4c6c0ce28cd14e09f64e
-
SHA512
6272ff19d48d60a1477a5e06ac93dca854c49e9193fadd481e76419821fec68e0364e4c8991711f634e98ca990fc142efffdc8f082f7731641be41bff40fb0ad
-
SSDEEP
24576:e9ntG/qdOxaNr+TcSQwfKYQCXcgyQTEeNPDsDO:ms/qdOxaZsswSYQWPPAeNo
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server196.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
lagos@123 - Email To:
[email protected]
Targets
-
-
Target
file.exe
-
Size
1.2MB
-
MD5
b0683925365bc31d28e77520b55a6175
-
SHA1
2ce8ad01ee917b1307eb706b33fcc7af7276612e
-
SHA256
675e5a2d1850dbf2fd2a6e99bc566e717a3b2221c7fe4c6c0ce28cd14e09f64e
-
SHA512
6272ff19d48d60a1477a5e06ac93dca854c49e9193fadd481e76419821fec68e0364e4c8991711f634e98ca990fc142efffdc8f082f7731641be41bff40fb0ad
-
SSDEEP
24576:e9ntG/qdOxaNr+TcSQwfKYQCXcgyQTEeNPDsDO:ms/qdOxaZsswSYQWPPAeNo
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-