General
-
Target
PO-3-07-23.exe
-
Size
901KB
-
Sample
230308-vgtbysfa5t
-
MD5
fcbd587b894d3d1508268b67c02d220f
-
SHA1
432a697f05de00a09d5d237dec6e0aa49cea03f8
-
SHA256
c0cbab8b9504e2575456d0f902b264123362665031999a3f780c2a5c2f0b9512
-
SHA512
6d9dfe62c73816754f8caada2c3e980a6900ce100afa0005c2cd9e30ec181920e80abd3dea9bc4956ba725b103efbed3469d3dc5b149bdb86dc2b30af6b83450
-
SSDEEP
12288:ke3ygxIyjPpBSqGiyol3PQJih+ZKdGUFRP0TVfXVZ67cNNBD9s9Etl0vjC44dBjj:ke3VTpBS3UZEs5sTRbBDsQD
Static task
static1
Behavioral task
behavioral1
Sample
PO-3-07-23.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO-3-07-23.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.coldiab.cl - Port:
587 - Username:
[email protected] - Password:
C0ldi4b2021npsw. - Email To:
[email protected]
Targets
-
-
Target
PO-3-07-23.exe
-
Size
901KB
-
MD5
fcbd587b894d3d1508268b67c02d220f
-
SHA1
432a697f05de00a09d5d237dec6e0aa49cea03f8
-
SHA256
c0cbab8b9504e2575456d0f902b264123362665031999a3f780c2a5c2f0b9512
-
SHA512
6d9dfe62c73816754f8caada2c3e980a6900ce100afa0005c2cd9e30ec181920e80abd3dea9bc4956ba725b103efbed3469d3dc5b149bdb86dc2b30af6b83450
-
SSDEEP
12288:ke3ygxIyjPpBSqGiyol3PQJih+ZKdGUFRP0TVfXVZ67cNNBD9s9Etl0vjC44dBjj:ke3VTpBS3UZEs5sTRbBDsQD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-