General
-
Target
AIT#435543.exe
-
Size
604KB
-
Sample
230705-hdgsjace7s
-
MD5
08a8436f9dd4d72ac7545adcd2176849
-
SHA1
31b625388d14f4cdc6a6d1fcfbf302076f7be507
-
SHA256
5f1062d2bb1b46b2ad72e7bc0e14c1b5a317a1b941a59ee7dc15ba27afe880ee
-
SHA512
c30720a6182c11432757946e93964543103506cf43580614684f873b9f4f2581bd8e54b8a8cba2ac7681f6514fc54f5bae4d4ec3680b4dbe27e2d56bf20351a2
-
SSDEEP
12288:MNaWonQ3fR/mOvYUG3eqdWdoiiQXyJyxVkKs12I:WzoyeONGuqdWGiiXyxY12I
Static task
static1
Behavioral task
behavioral1
Sample
AIT#435543.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
AIT#435543.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.chestronics.com - Port:
587 - Username:
[email protected] - Password:
]DV(A,K%8op6 - Email To:
[email protected]
Targets
-
-
Target
AIT#435543.exe
-
Size
604KB
-
MD5
08a8436f9dd4d72ac7545adcd2176849
-
SHA1
31b625388d14f4cdc6a6d1fcfbf302076f7be507
-
SHA256
5f1062d2bb1b46b2ad72e7bc0e14c1b5a317a1b941a59ee7dc15ba27afe880ee
-
SHA512
c30720a6182c11432757946e93964543103506cf43580614684f873b9f4f2581bd8e54b8a8cba2ac7681f6514fc54f5bae4d4ec3680b4dbe27e2d56bf20351a2
-
SSDEEP
12288:MNaWonQ3fR/mOvYUG3eqdWdoiiQXyJyxVkKs12I:WzoyeONGuqdWGiiXyxY12I
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-