General
-
Target
tmp
-
Size
1.1MB
-
Sample
230301-y37m9aaa72
-
MD5
f83f5ead77813f754ffb97ca69d37748
-
SHA1
2ed5c01053c0d0affd3915725b76aefede0aafdb
-
SHA256
754d1ba349e7f1633d9a6ee33497c5543aeb8710e70e89e799368d00b6e7062a
-
SHA512
82e7c9119e5cb5b3ccbf6413f21bbb5d5930953cc09ca28c1932cc6c2aa3b3712b9336ae207d86ae49b6ac19fc803ed402a9d9e0032d402f1d698f15a8977165
-
SSDEEP
24576:MOmIeCDWzU1V0oV3M8qrdILuuo4QDY5k4rx:LiHzo0q3MFqFAQV
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
hnxqezadblabdsss
Targets
-
-
Target
tmp
-
Size
1.1MB
-
MD5
f83f5ead77813f754ffb97ca69d37748
-
SHA1
2ed5c01053c0d0affd3915725b76aefede0aafdb
-
SHA256
754d1ba349e7f1633d9a6ee33497c5543aeb8710e70e89e799368d00b6e7062a
-
SHA512
82e7c9119e5cb5b3ccbf6413f21bbb5d5930953cc09ca28c1932cc6c2aa3b3712b9336ae207d86ae49b6ac19fc803ed402a9d9e0032d402f1d698f15a8977165
-
SSDEEP
24576:MOmIeCDWzU1V0oV3M8qrdILuuo4QDY5k4rx:LiHzo0q3MFqFAQV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-