General
-
Target
8bf173aff4199d406af58097f9a02434.bin
-
Size
727KB
-
Sample
230518-bg8l4afh81
-
MD5
8bf173aff4199d406af58097f9a02434
-
SHA1
95bf3e1a2ba4c7b7992e4aa7e3291fca187b50a8
-
SHA256
ed9248192c85ed4a3053e0c5bf1763cb1e39ed9514122a29542e439461c89f9b
-
SHA512
ff3436ff08dd861b8868f996e548337ef5b644fe3e2dbb007e925fda6f26740382c81e01d19ba7dc8387ed594a3c0bf408f8e535e0874a4783fed85fa9a16b65
-
SSDEEP
12288:vf1Z6SljSn+1fyjVsjQbM+AqVX5zspuvwQ:n1Z5PfyjG8I+PzYKwQ
Static task
static1
Behavioral task
behavioral1
Sample
8bf173aff4199d406af58097f9a02434.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8bf173aff4199d406af58097f9a02434.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rapidcheckng.com - Port:
587 - Username:
[email protected] - Password:
@Rapidcheckng# - Email To:
[email protected]
Targets
-
-
Target
8bf173aff4199d406af58097f9a02434.bin
-
Size
727KB
-
MD5
8bf173aff4199d406af58097f9a02434
-
SHA1
95bf3e1a2ba4c7b7992e4aa7e3291fca187b50a8
-
SHA256
ed9248192c85ed4a3053e0c5bf1763cb1e39ed9514122a29542e439461c89f9b
-
SHA512
ff3436ff08dd861b8868f996e548337ef5b644fe3e2dbb007e925fda6f26740382c81e01d19ba7dc8387ed594a3c0bf408f8e535e0874a4783fed85fa9a16b65
-
SSDEEP
12288:vf1Z6SljSn+1fyjVsjQbM+AqVX5zspuvwQ:n1Z5PfyjG8I+PzYKwQ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-