General
-
Target
c4df006e39809b6857f3cc9117fa2088
-
Size
774KB
-
Sample
230628-ht48rsgf36
-
MD5
c4df006e39809b6857f3cc9117fa2088
-
SHA1
cd5ae28a1037aa467b507f533a3361383a954cf6
-
SHA256
ccc2705cc016a910af89b39b5beeca2885eedd714cca5ab153b416c201d0ea96
-
SHA512
aa175d94622ae6b55b0ea77783b838877a852c4d7884c759eff1bb6b8df55e81d170a4848fc9892e3a3ceaf781bc4a6771e2ff01cf80ae8af6c32389202f5945
-
SSDEEP
12288:PNnGCF9QcI5Szby9RkQEt1LgYaHxFBF4EllnGFveYp3wvmcC:PFGCocNwRkXMrBiylGFvervs
Static task
static1
Behavioral task
behavioral1
Sample
c4df006e39809b6857f3cc9117fa2088.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
c4df006e39809b6857f3cc9117fa2088.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
qnfivqsjvejrdkuz - Email To:
[email protected]
Targets
-
-
Target
c4df006e39809b6857f3cc9117fa2088
-
Size
774KB
-
MD5
c4df006e39809b6857f3cc9117fa2088
-
SHA1
cd5ae28a1037aa467b507f533a3361383a954cf6
-
SHA256
ccc2705cc016a910af89b39b5beeca2885eedd714cca5ab153b416c201d0ea96
-
SHA512
aa175d94622ae6b55b0ea77783b838877a852c4d7884c759eff1bb6b8df55e81d170a4848fc9892e3a3ceaf781bc4a6771e2ff01cf80ae8af6c32389202f5945
-
SSDEEP
12288:PNnGCF9QcI5Szby9RkQEt1LgYaHxFBF4EllnGFveYp3wvmcC:PFGCocNwRkXMrBiylGFvervs
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-