General
-
Target
203730-gvailantzxexe.exe
-
Size
707KB
-
Sample
230704-v6awxahe3t
-
MD5
00550de2665e6d7cb87ebea46b8b6cbf
-
SHA1
2021dbd6b56baebe25112e710d3e2497846a6844
-
SHA256
d385b93c9c93907ce2a86d7bd3a882b2f678cb524235b5fd06ca7b9e523adc70
-
SHA512
40f2ba9323dbccc7401bf647702c9e3d7de69e96e342d3931570e58009a060301cdbcd4232bcc61283a708f9e50062aa6248509d8ce31e1ee10702b2d4c8db4c
-
SSDEEP
12288:yhz0LJYBOC9GCxl0Jk+CzTsKM6z/fjtEwkLVygKEo45skoDv:y6LJCdPQKMSjBkAghnu
Static task
static1
Behavioral task
behavioral1
Sample
203730-gvailantzxexe.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
203730-gvailantzxexe.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
Protocol: smtp- Host:
shark.ipchina163.com - Port:
587 - Username:
[email protected] - Password:
ID6njP2TMC$O
Extracted
agenttesla
Protocol: smtp- Host:
shark.ipchina163.com - Port:
587 - Username:
[email protected] - Password:
ID6njP2TMC$O - Email To:
[email protected]
Targets
-
-
Target
203730-gvailantzxexe.exe
-
Size
707KB
-
MD5
00550de2665e6d7cb87ebea46b8b6cbf
-
SHA1
2021dbd6b56baebe25112e710d3e2497846a6844
-
SHA256
d385b93c9c93907ce2a86d7bd3a882b2f678cb524235b5fd06ca7b9e523adc70
-
SHA512
40f2ba9323dbccc7401bf647702c9e3d7de69e96e342d3931570e58009a060301cdbcd4232bcc61283a708f9e50062aa6248509d8ce31e1ee10702b2d4c8db4c
-
SSDEEP
12288:yhz0LJYBOC9GCxl0Jk+CzTsKM6z/fjtEwkLVygKEo45skoDv:y6LJCdPQKMSjBkAghnu
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-