General
-
Target
SecuriteInfo.com.Trojan.MSIL.FormBook.AGCG.MTB.18730.19437.exe
-
Size
773KB
-
Sample
221203-jftesafd26
-
MD5
1ab66537aa5e76127a5ca907ae814fe0
-
SHA1
97bb5b41ef20cd53520e87a92bb75f93cea49a06
-
SHA256
7604e738af25d6555758575a5a98af1e57e85ed5571dc2d2588b58c50f0864db
-
SHA512
9665c4170f859ab5d5f2dd83957d095ad5f2a69959f84cf65c5441087de8f09599e9c65c23b5986465eee5a860d646bf3835559640fa347195e2956c17096e6c
-
SSDEEP
12288:kLcuCqwqX4/wGvAgZNzg8PpvkruVhoXkg586aWHff:7uCqVXTGvAgHsAaruVIB5O8f
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.MSIL.FormBook.AGCG.MTB.18730.19437.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.MSIL.FormBook.AGCG.MTB.18730.19437.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.woxi.cz - Port:
587 - Username:
[email protected] - Password:
Avarskypes8108 - Email To:
[email protected]
Targets
-
-
Target
SecuriteInfo.com.Trojan.MSIL.FormBook.AGCG.MTB.18730.19437.exe
-
Size
773KB
-
MD5
1ab66537aa5e76127a5ca907ae814fe0
-
SHA1
97bb5b41ef20cd53520e87a92bb75f93cea49a06
-
SHA256
7604e738af25d6555758575a5a98af1e57e85ed5571dc2d2588b58c50f0864db
-
SHA512
9665c4170f859ab5d5f2dd83957d095ad5f2a69959f84cf65c5441087de8f09599e9c65c23b5986465eee5a860d646bf3835559640fa347195e2956c17096e6c
-
SSDEEP
12288:kLcuCqwqX4/wGvAgZNzg8PpvkruVhoXkg586aWHff:7uCqVXTGvAgHsAaruVIB5O8f
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-