General
-
Target
69be1ecad83bd419977aefd1e8777332.exe
-
Size
956KB
-
Sample
221210-kyxetsfc58
-
MD5
69be1ecad83bd419977aefd1e8777332
-
SHA1
7d6e37043d3bbe0a2b1099ab22bc58e2628ad2b8
-
SHA256
626b38eceda55688275aec055e69b4cfbf2853b6e3d32e7ad0dfee6f1873fc02
-
SHA512
e61df9fed3c55b1242890b9f5457f085eaf11e229e8fa54aa7af2179dbf242e61e7e5b5e235cd4907e7791daf7a789f0d408f910fb7265e5f71b10dfb26f5b4d
-
SSDEEP
12288:b28yFT7GPtdUAG/mZoIms2jIEIX1uXnbT9LfeUi0wHv9gpY+ZmBjHUk+qjK3o3:q8MTql9GoWs2jICdfeUU9AhZmBHE
Static task
static1
Behavioral task
behavioral1
Sample
69be1ecad83bd419977aefd1e8777332.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
69be1ecad83bd419977aefd1e8777332.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server323.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
turkey@123 - Email To:
[email protected]
Targets
-
-
Target
69be1ecad83bd419977aefd1e8777332.exe
-
Size
956KB
-
MD5
69be1ecad83bd419977aefd1e8777332
-
SHA1
7d6e37043d3bbe0a2b1099ab22bc58e2628ad2b8
-
SHA256
626b38eceda55688275aec055e69b4cfbf2853b6e3d32e7ad0dfee6f1873fc02
-
SHA512
e61df9fed3c55b1242890b9f5457f085eaf11e229e8fa54aa7af2179dbf242e61e7e5b5e235cd4907e7791daf7a789f0d408f910fb7265e5f71b10dfb26f5b4d
-
SSDEEP
12288:b28yFT7GPtdUAG/mZoIms2jIEIX1uXnbT9LfeUi0wHv9gpY+ZmBjHUk+qjK3o3:q8MTql9GoWs2jICdfeUU9AhZmBHE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-