General
-
Target
6cca2ddbe7b661e17343d57dcd7fea8d74f33660
-
Size
550KB
-
Sample
230114-hnnzlafc2v
-
MD5
dbe24d23efd43e8172cde43ca708ab74
-
SHA1
6cca2ddbe7b661e17343d57dcd7fea8d74f33660
-
SHA256
564e748a2164cc70ec2c77d9830e301dedc3439f165fd8cc798bbd53fa168862
-
SHA512
39a2494b2998da50390c6fd9bedaf30a55841df3ad25f9b8ff4a6df1967ce5ab18a85bffd6a4869ee812ed1093abf6b743cdffa057d9d79a3565319b6e1b4daa
-
SSDEEP
12288:aYz8Z4wLYeghoJZA76hs0OI+NYNydH5t7X:aYg50b6DA72snhOk5
Static task
static1
Behavioral task
behavioral1
Sample
6cca2ddbe7b661e17343d57dcd7fea8d74f33660.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6cca2ddbe7b661e17343d57dcd7fea8d74f33660.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
hnxqezadblabdsss
Targets
-
-
Target
6cca2ddbe7b661e17343d57dcd7fea8d74f33660
-
Size
550KB
-
MD5
dbe24d23efd43e8172cde43ca708ab74
-
SHA1
6cca2ddbe7b661e17343d57dcd7fea8d74f33660
-
SHA256
564e748a2164cc70ec2c77d9830e301dedc3439f165fd8cc798bbd53fa168862
-
SHA512
39a2494b2998da50390c6fd9bedaf30a55841df3ad25f9b8ff4a6df1967ce5ab18a85bffd6a4869ee812ed1093abf6b743cdffa057d9d79a3565319b6e1b4daa
-
SSDEEP
12288:aYz8Z4wLYeghoJZA76hs0OI+NYNydH5t7X:aYg50b6DA72snhOk5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-