General
-
Target
07acee9113733e50649a723a3b5f775c.exe
-
Size
377KB
-
Sample
221210-kyxetsaa6y
-
MD5
07acee9113733e50649a723a3b5f775c
-
SHA1
9931942a4e4db3e8f962e48c78864d4fe6082d23
-
SHA256
03c88e9e5911ea62332b5e92a475a8784c16371430b544c0d2ba817bbbe210a0
-
SHA512
0b2e067420cccf7657509986268d5dc08111aecbca957acd226125d0fea46a2f7b58781b3984af36333101e384b352a3beb2d80b5fc62a065099b20b070b5d87
-
SSDEEP
6144:ykwPT2lj+OptcyDu1Au6tOQREAhm/W6YqXgpQd1/ap4/SA5Dkjirl:8qqOpeMueuesTTYGcQb1SA5DkGl
Static task
static1
Behavioral task
behavioral1
Sample
07acee9113733e50649a723a3b5f775c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
07acee9113733e50649a723a3b5f775c.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
qvomoeworkyzeqvn
Targets
-
-
Target
07acee9113733e50649a723a3b5f775c.exe
-
Size
377KB
-
MD5
07acee9113733e50649a723a3b5f775c
-
SHA1
9931942a4e4db3e8f962e48c78864d4fe6082d23
-
SHA256
03c88e9e5911ea62332b5e92a475a8784c16371430b544c0d2ba817bbbe210a0
-
SHA512
0b2e067420cccf7657509986268d5dc08111aecbca957acd226125d0fea46a2f7b58781b3984af36333101e384b352a3beb2d80b5fc62a065099b20b070b5d87
-
SSDEEP
6144:ykwPT2lj+OptcyDu1Au6tOQREAhm/W6YqXgpQd1/ap4/SA5Dkjirl:8qqOpeMueuesTTYGcQb1SA5DkGl
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-