General
-
Target
Inv. & SOA.exe
-
Size
881KB
-
Sample
230630-h6n3bagd88
-
MD5
be042f209b58598fe1e6a1dd0069338f
-
SHA1
e65ada8af54201b0251f105d56acd200ef1f6adc
-
SHA256
9618f331b2bbad7bbb947cedaad7dd744169318cb11212e05089c6f4b8983400
-
SHA512
4016a3f80ede87654c9571d3a070f9d6cfa25a0cc83d8c2fe227f0f18a82c821c0580aa82b844cfb079b69db404a3b3fc3808143b20e8a8f8e6f9f47f65a785e
-
SSDEEP
12288:0n7hgpSrh2uh87xM2dnn4TktJXCTDW01RYcOrsj0T55C:CmAt2h7lx4TktJXoYcOrs
Static task
static1
Behavioral task
behavioral1
Sample
Inv. & SOA.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Inv. & SOA.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gimpex-imerys.com - Port:
587 - Username:
[email protected] - Password:
h45ZVRb6(IMF - Email To:
[email protected]
Targets
-
-
Target
Inv. & SOA.exe
-
Size
881KB
-
MD5
be042f209b58598fe1e6a1dd0069338f
-
SHA1
e65ada8af54201b0251f105d56acd200ef1f6adc
-
SHA256
9618f331b2bbad7bbb947cedaad7dd744169318cb11212e05089c6f4b8983400
-
SHA512
4016a3f80ede87654c9571d3a070f9d6cfa25a0cc83d8c2fe227f0f18a82c821c0580aa82b844cfb079b69db404a3b3fc3808143b20e8a8f8e6f9f47f65a785e
-
SSDEEP
12288:0n7hgpSrh2uh87xM2dnn4TktJXCTDW01RYcOrsj0T55C:CmAt2h7lx4TktJXoYcOrs
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-