General
-
Target
5e20a6acf6cfec604e8f1fa9421385bc
-
Size
606KB
-
Sample
230705-jldlhscg3y
-
MD5
5e20a6acf6cfec604e8f1fa9421385bc
-
SHA1
d4e656c2edbf2ab96a212e98117cacffd2b3493a
-
SHA256
e5b3f5c88055487475981257a3146b756a653845e01c66141d3547192805a8f3
-
SHA512
122d9a19db8ed021ee27e20b8876a6822648cb89185d7125fdf5533fc69f43cac8c352324ede984a4e54fe9694e3a0b2ee6cb4e821449f93f94cc0621d9ca693
-
SSDEEP
12288:yuqLBn99JFB5NzbTjOzt+4Hhz9PAAETGVwPtM1k2:ytB99rB5ZnjqthBBWT9yk
Static task
static1
Behavioral task
behavioral1
Sample
5e20a6acf6cfec604e8f1fa9421385bc.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
5e20a6acf6cfec604e8f1fa9421385bc.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.udpl.top - Port:
587 - Username:
[email protected] - Password:
,_lBNs3g,F$M
Extracted
agenttesla
Protocol: smtp- Host:
mail.udpl.top - Port:
587 - Username:
[email protected] - Password:
,_lBNs3g,F$M - Email To:
[email protected]
Targets
-
-
Target
5e20a6acf6cfec604e8f1fa9421385bc
-
Size
606KB
-
MD5
5e20a6acf6cfec604e8f1fa9421385bc
-
SHA1
d4e656c2edbf2ab96a212e98117cacffd2b3493a
-
SHA256
e5b3f5c88055487475981257a3146b756a653845e01c66141d3547192805a8f3
-
SHA512
122d9a19db8ed021ee27e20b8876a6822648cb89185d7125fdf5533fc69f43cac8c352324ede984a4e54fe9694e3a0b2ee6cb4e821449f93f94cc0621d9ca693
-
SSDEEP
12288:yuqLBn99JFB5NzbTjOzt+4Hhz9PAAETGVwPtM1k2:ytB99rB5ZnjqthBBWT9yk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-