General
-
Target
d4e212ed0c179d4f5ca457ce591b533e41e6111b72014274024a88aa519418d6
-
Size
692KB
-
Sample
221205-jrg6wseb2y
-
MD5
a5215315ba08b7e3da51877307c12a9b
-
SHA1
0891ed0e25efb8dbf09e749ec98c9cc099d8d00c
-
SHA256
d4e212ed0c179d4f5ca457ce591b533e41e6111b72014274024a88aa519418d6
-
SHA512
1e05a1a612864c1854f542af3b5a1450029b0cde7b1490b109fca5d07d665144365b651954a5b4073d3636fd5487f271e07a255001521782bc046384b5f9acaf
-
SSDEEP
12288:qPuYd+V6b1momPZefsAjkmZyUHxBtbCbujqGjnr8wymg1mwuhcdHhL2GvPuYd+VW:qPuYd+V6bIomxiswkHUHB4aqGjr8jNmG
Static task
static1
Behavioral task
behavioral1
Sample
d4e212ed0c179d4f5ca457ce591b533e41e6111b72014274024a88aa519418d6.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.eslinaasansor.com.tr - Port:
587 - Username:
[email protected] - Password:
eslina2020info - Email To:
[email protected]
Targets
-
-
Target
d4e212ed0c179d4f5ca457ce591b533e41e6111b72014274024a88aa519418d6
-
Size
692KB
-
MD5
a5215315ba08b7e3da51877307c12a9b
-
SHA1
0891ed0e25efb8dbf09e749ec98c9cc099d8d00c
-
SHA256
d4e212ed0c179d4f5ca457ce591b533e41e6111b72014274024a88aa519418d6
-
SHA512
1e05a1a612864c1854f542af3b5a1450029b0cde7b1490b109fca5d07d665144365b651954a5b4073d3636fd5487f271e07a255001521782bc046384b5f9acaf
-
SSDEEP
12288:qPuYd+V6b1momPZefsAjkmZyUHxBtbCbujqGjnr8wymg1mwuhcdHhL2GvPuYd+VW:qPuYd+V6bIomxiswkHUHB4aqGjr8jNmG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-