General
-
Target
572b30c75a8e85b87ec00e12f93f743a.exe
-
Size
490KB
-
Sample
230106-l3dc7abc9z
-
MD5
572b30c75a8e85b87ec00e12f93f743a
-
SHA1
d32a1e3e696b61d8fa03f3201066782c8f7b16ed
-
SHA256
f826131b5c356693f53746f0af896eaac4217ef48a1e148759541c21fe29b07d
-
SHA512
dcd136679267c22aab305d36a18f8f74431e2617121f73af0a6d7d9b17ada7f700929a236782f3e19c5aea30475e7107af17ff9c0026576d7b9867cb6426448c
-
SSDEEP
6144:GYa6EUS6Eui96sY8Z2a0oHE13N/0Xo9bMJcSd5BC9O54V59qPr2FkEe9SSeG:GYIuzsY8iowmXjJhoOqLqPN0SL
Static task
static1
Behavioral task
behavioral1
Sample
572b30c75a8e85b87ec00e12f93f743a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
572b30c75a8e85b87ec00e12f93f743a.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
hnxqezadblabdsss
Targets
-
-
Target
572b30c75a8e85b87ec00e12f93f743a.exe
-
Size
490KB
-
MD5
572b30c75a8e85b87ec00e12f93f743a
-
SHA1
d32a1e3e696b61d8fa03f3201066782c8f7b16ed
-
SHA256
f826131b5c356693f53746f0af896eaac4217ef48a1e148759541c21fe29b07d
-
SHA512
dcd136679267c22aab305d36a18f8f74431e2617121f73af0a6d7d9b17ada7f700929a236782f3e19c5aea30475e7107af17ff9c0026576d7b9867cb6426448c
-
SSDEEP
6144:GYa6EUS6Eui96sY8Z2a0oHE13N/0Xo9bMJcSd5BC9O54V59qPr2FkEe9SSeG:GYIuzsY8iowmXjJhoOqLqPN0SL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-