General
-
Target
69bed0fe2df98e6983bc3da51de961712a38ebc32cf45b336f72496a29a76286
-
Size
717KB
-
Sample
221125-c6rwbafb69
-
MD5
849572f48e748aa591bd6452054b566a
-
SHA1
272c3b92e8e89ece4273a54b96540306915747f1
-
SHA256
69bed0fe2df98e6983bc3da51de961712a38ebc32cf45b336f72496a29a76286
-
SHA512
a594576ac245232399b7df5ce69bb900d988eb2e1b9cd74f4dce694d9c8aefd32f679506ec97a7b05a84e223a811a61efee44ba383c6647e75547afa7ef142b8
-
SSDEEP
12288:KcHU8QaZF468peIupP9GxJVZ2h/ISejSC+mZJbxpDF:JdZF468pBOOoDlC+
Static task
static1
Behavioral task
behavioral1
Sample
69bed0fe2df98e6983bc3da51de961712a38ebc32cf45b336f72496a29a76286.exe
Resource
win10-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
KKK123456@@
Targets
-
-
Target
69bed0fe2df98e6983bc3da51de961712a38ebc32cf45b336f72496a29a76286
-
Size
717KB
-
MD5
849572f48e748aa591bd6452054b566a
-
SHA1
272c3b92e8e89ece4273a54b96540306915747f1
-
SHA256
69bed0fe2df98e6983bc3da51de961712a38ebc32cf45b336f72496a29a76286
-
SHA512
a594576ac245232399b7df5ce69bb900d988eb2e1b9cd74f4dce694d9c8aefd32f679506ec97a7b05a84e223a811a61efee44ba383c6647e75547afa7ef142b8
-
SSDEEP
12288:KcHU8QaZF468peIupP9GxJVZ2h/ISejSC+mZJbxpDF:JdZF468pBOOoDlC+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-