General
-
Target
Betaling,jpg.exe
-
Size
798KB
-
Sample
230331-h3ygksac6s
-
MD5
c9ee1dae02a9961479085904a889bcf1
-
SHA1
6fd63820b7304f567733d2b742a884db76a33878
-
SHA256
cc52858669052729a30b968cfcd103bdd10cb6c1099090d9e21b0116eb891482
-
SHA512
8edc2cbc038cea06e7d1c6d4c01a2abc8a8f777737e1bda08ad8981f695a8d7f79cb991ec1667350ba32e7b5486e71d34afcd48e403755ac42086f8b88036468
-
SSDEEP
24576:lYkimX0T9OlQFXL0ZQMXNFi/EVn1dnkHV:l0GQyQiF1jdnkHV
Static task
static1
Behavioral task
behavioral1
Sample
Betaling,jpg.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Betaling,jpg.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.amwi.net - Port:
587 - Username:
fax@doc-henne.de - Password:
A77i6l!v - Email To:
goldcoin77@consultant.com
Targets
-
-
Target
Betaling,jpg.exe
-
Size
798KB
-
MD5
c9ee1dae02a9961479085904a889bcf1
-
SHA1
6fd63820b7304f567733d2b742a884db76a33878
-
SHA256
cc52858669052729a30b968cfcd103bdd10cb6c1099090d9e21b0116eb891482
-
SHA512
8edc2cbc038cea06e7d1c6d4c01a2abc8a8f777737e1bda08ad8981f695a8d7f79cb991ec1667350ba32e7b5486e71d34afcd48e403755ac42086f8b88036468
-
SSDEEP
24576:lYkimX0T9OlQFXL0ZQMXNFi/EVn1dnkHV:l0GQyQiF1jdnkHV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-