General
-
Target
d5b1e18d554082aca046f9795f7de36aa1c7109871c5c9cb637d223396afb000
-
Size
1.0MB
-
Sample
221209-mz8wcsda38
-
MD5
3b341ba501e0a4bda185f3aa11bb6198
-
SHA1
794bd88c3a6a207afed7822392a0f165e9e5ef55
-
SHA256
d5b1e18d554082aca046f9795f7de36aa1c7109871c5c9cb637d223396afb000
-
SHA512
e05ba1db2bc82901798557d737e1bcd195c57b367c33dc68cd1ec47d21ddcdeccfdde55e697b1bbd7fbf268ff177955c312a0cf0b838f77c62a00c4088205433
-
SSDEEP
24576:qffpFFTnz1m2d/AMCU//i4djDBeO5flWDrtnVveP6ehq:OnzjAMC+ReqflWtV2Phhq
Static task
static1
Behavioral task
behavioral1
Sample
d5b1e18d554082aca046f9795f7de36aa1c7109871c5c9cb637d223396afb000.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server323.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
turkey@123 - Email To:
[email protected]
Targets
-
-
Target
d5b1e18d554082aca046f9795f7de36aa1c7109871c5c9cb637d223396afb000
-
Size
1.0MB
-
MD5
3b341ba501e0a4bda185f3aa11bb6198
-
SHA1
794bd88c3a6a207afed7822392a0f165e9e5ef55
-
SHA256
d5b1e18d554082aca046f9795f7de36aa1c7109871c5c9cb637d223396afb000
-
SHA512
e05ba1db2bc82901798557d737e1bcd195c57b367c33dc68cd1ec47d21ddcdeccfdde55e697b1bbd7fbf268ff177955c312a0cf0b838f77c62a00c4088205433
-
SSDEEP
24576:qffpFFTnz1m2d/AMCU//i4djDBeO5flWDrtnVveP6ehq:OnzjAMC+ReqflWtV2Phhq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-