General
-
Target
EB3950C34E05DBF1DA544B116FEC8095D765793AFFA21DA28DC6E083842573F2
-
Size
834KB
-
Sample
221208-yfl32abc26
-
MD5
c5c0a553e6b8eb2aa68166c2f10d2250
-
SHA1
04a71a66a22f630a2e4bbe583152686a27904913
-
SHA256
eb3950c34e05dbf1da544b116fec8095d765793affa21da28dc6e083842573f2
-
SHA512
26190b9d11054784550207fe57b0832785bd045f81e947b32c6db9366a26f5328e08edff2249afbfddaa7fe83e76d4abe1c26848c2e163f692ad2d8e396801d9
-
SSDEEP
24576:a0RXr6LtTnL/h1o8K5z8tPKw4m7tK6vzcXQsCMcw2xU:jXYHh122PKw4EK6bcAHxU
Static task
static1
Behavioral task
behavioral1
Sample
GHYJZmLLUrK1rL7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
GHYJZmLLUrK1rL7.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server.high-five.co - Port:
587 - Username:
[email protected] - Password:
qwerty223@@@ - Email To:
[email protected]
Targets
-
-
Target
GHYJZmLLUrK1rL7.exe
-
Size
908KB
-
MD5
21fcab8e0edf4fdf0297025366645193
-
SHA1
8e33468a95a1310cc7c1e5b3449bfcb12fa0a10a
-
SHA256
077cead95be622bb2490f027f43449e198f91e189469da4a48adea41d5286e5d
-
SHA512
0ce4bcf7dc356e47be0cc1f1642fb705d0d5ed0da54d4ee36ce8d4a7ce2da922300cc8262db672324693e2d17a2cc06cae01e0989e2bf30e043404726901edfb
-
SSDEEP
12288:1ALv2P7Lj/c66AuaClgT70y3awWecpQ26BqPwNK7sb7/sn1gSp4JZn9jq+6cMEFh:SLYLj7Ju/gIyKjyPe7w7En1gSp4Tn9j
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-