General
-
Target
IMG_7001_8072pdf.exe
-
Size
292KB
-
Sample
230530-hgxcdsfg88
-
MD5
50b81721effc6c7e08a3c734a6d526cf
-
SHA1
7728a4eaeaf058bd0df79a63b1137a8a428c7e20
-
SHA256
f4a0b96ac60450021cf3dd030d05b3a8a9f2a7c586b376d09f4988938093773f
-
SHA512
a46026a676c2cc9e3a51d799ecca815ab09c01d89e7618323cb3dee0c3bb60b1830873b356254babe92f24d8ae0de5810f284d0307c4bb46f4241c508cc988c4
-
SSDEEP
6144:dDxhk+LJwJxtKruju+JJJL8DrGb4LZ8qzT+JTl9:drFLyxtwSxJv8DfZ8qzTO
Static task
static1
Behavioral task
behavioral1
Sample
IMG_7001_8072pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
IMG_7001_8072pdf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
logxtai.shop - Port:
587 - Username:
[email protected] - Password:
M9Z}uk]!yhoU - Email To:
[email protected]
Targets
-
-
Target
IMG_7001_8072pdf.exe
-
Size
292KB
-
MD5
50b81721effc6c7e08a3c734a6d526cf
-
SHA1
7728a4eaeaf058bd0df79a63b1137a8a428c7e20
-
SHA256
f4a0b96ac60450021cf3dd030d05b3a8a9f2a7c586b376d09f4988938093773f
-
SHA512
a46026a676c2cc9e3a51d799ecca815ab09c01d89e7618323cb3dee0c3bb60b1830873b356254babe92f24d8ae0de5810f284d0307c4bb46f4241c508cc988c4
-
SSDEEP
6144:dDxhk+LJwJxtKruju+JJJL8DrGb4LZ8qzT+JTl9:drFLyxtwSxJv8DfZ8qzTO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-