General
-
Target
cec5cc9dfa8e64cd0bacc6aa6f7767729dec65d6a8d53184b887dc89a6a76884
-
Size
827KB
-
Sample
230607-yg26msfb62
-
MD5
c8276b980d364eb06310790c45756831
-
SHA1
351906d842e5f110b97fab216095b5474962e306
-
SHA256
cec5cc9dfa8e64cd0bacc6aa6f7767729dec65d6a8d53184b887dc89a6a76884
-
SHA512
2f1654f1d51083b9d212d86e13ff58b1414c513b78162a8fa392196d8ee065273872cdd72f6039b0fe0d5cac0c8ec3bacc4f5598e479a3f4475cbcd44fa33d85
-
SSDEEP
12288:LHrkBF0haDnLMzIL2q+RTdOL8OOQ7BJaBdRRzxIPUmEsVXD7QU4xTknvPKmkBX/S:LABFKOyqGUL8mPcNxIPUC7uxTk336Xa
Static task
static1
Behavioral task
behavioral1
Sample
cec5cc9dfa8e64cd0bacc6aa6f7767729dec65d6a8d53184b887dc89a6a76884.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.grad-vodice.hr - Port:
587 - Username:
[email protected] - Password:
pKs9zy8Nn1
Extracted
agenttesla
Protocol: smtp- Host:
mail.grad-vodice.hr - Port:
587 - Username:
[email protected] - Password:
pKs9zy8Nn1 - Email To:
[email protected]
Targets
-
-
Target
cec5cc9dfa8e64cd0bacc6aa6f7767729dec65d6a8d53184b887dc89a6a76884
-
Size
827KB
-
MD5
c8276b980d364eb06310790c45756831
-
SHA1
351906d842e5f110b97fab216095b5474962e306
-
SHA256
cec5cc9dfa8e64cd0bacc6aa6f7767729dec65d6a8d53184b887dc89a6a76884
-
SHA512
2f1654f1d51083b9d212d86e13ff58b1414c513b78162a8fa392196d8ee065273872cdd72f6039b0fe0d5cac0c8ec3bacc4f5598e479a3f4475cbcd44fa33d85
-
SSDEEP
12288:LHrkBF0haDnLMzIL2q+RTdOL8OOQ7BJaBdRRzxIPUmEsVXD7QU4xTknvPKmkBX/S:LABFKOyqGUL8mPcNxIPUC7uxTk336Xa
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-