General
-
Target
SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exe
-
Size
828KB
-
Sample
221129-jgdqqahe27
-
MD5
800ad195e5fb86784cc72208a2eb3e47
-
SHA1
8547bb4c6ff1a37fce2ecfc0e31ce9441d76964c
-
SHA256
7d12f2ba49fa84ea8e2db0a6cad3db2ef817d808ce19b47a98e1fb02cba2760f
-
SHA512
57d28106f3c9752dc7a4c42a4ab1460bbd8031d23ab071f2459f683dbd4d16f53a46fdbb7989ca2415307f80275c7dfcbda504c610019b948c2d08942c4908da
-
SSDEEP
12288:y7qeQuSTi89eHFr5cE8LHWu/SEdRMA/LyVu6gt0IPPet5G5SZ9B7tLgEBwwu:wwvihcvLF9/L1t0InerZ1xqwu
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.instalcop.pl - Port:
587 - Username:
[email protected] - Password:
ibf9W15* - Email To:
[email protected]
Targets
-
-
Target
SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exe
-
Size
828KB
-
MD5
800ad195e5fb86784cc72208a2eb3e47
-
SHA1
8547bb4c6ff1a37fce2ecfc0e31ce9441d76964c
-
SHA256
7d12f2ba49fa84ea8e2db0a6cad3db2ef817d808ce19b47a98e1fb02cba2760f
-
SHA512
57d28106f3c9752dc7a4c42a4ab1460bbd8031d23ab071f2459f683dbd4d16f53a46fdbb7989ca2415307f80275c7dfcbda504c610019b948c2d08942c4908da
-
SSDEEP
12288:y7qeQuSTi89eHFr5cE8LHWu/SEdRMA/LyVu6gt0IPPet5G5SZ9B7tLgEBwwu:wwvihcvLF9/L1t0InerZ1xqwu
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-