General
-
Target
R09876556789000G.jar
-
Size
1.1MB
-
Sample
230519-he7eksfe62
-
MD5
89b1c7884d5ec1bfc18142f725fde3f8
-
SHA1
e95ab3a5eca60dd08fe4703abe420a29cf357a2f
-
SHA256
b79d1da91f9a15f6bc930bd5b4bf714c016862f04052c3dd5cb79c3464e0f775
-
SHA512
1f81f2de35ad05321fc3761b601a1a82af7e64d93f5072acfbcd262a34ae8acd610a93629369963dfa35e893aae7b423030456a896d11bc965544f73aa94934f
-
SSDEEP
24576:EoOQtokLVRpJOemLmrq5OI5HR735U09kLVRpJOemLmrq5OI5HR735U0C:EjkBRpXrq5nHR779kBRpXrq5nHR77C
Static task
static1
Behavioral task
behavioral1
Sample
R09876556789000G.jar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
R09876556789000G.jar
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ionos.mx - Port:
587 - Username:
[email protected] - Password:
Ku77yE-Mail-1980.! - Email To:
[email protected]
Targets
-
-
Target
R09876556789000G.jar
-
Size
1.1MB
-
MD5
89b1c7884d5ec1bfc18142f725fde3f8
-
SHA1
e95ab3a5eca60dd08fe4703abe420a29cf357a2f
-
SHA256
b79d1da91f9a15f6bc930bd5b4bf714c016862f04052c3dd5cb79c3464e0f775
-
SHA512
1f81f2de35ad05321fc3761b601a1a82af7e64d93f5072acfbcd262a34ae8acd610a93629369963dfa35e893aae7b423030456a896d11bc965544f73aa94934f
-
SSDEEP
24576:EoOQtokLVRpJOemLmrq5OI5HR735U09kLVRpJOemLmrq5OI5HR735U0C:EjkBRpXrq5nHR779kBRpXrq5nHR77C
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-