General
-
Target
Transferencia.exe
-
Size
624KB
-
Sample
230719-j548ksac5x
-
MD5
6c69b1778096564e9926f9cab8600031
-
SHA1
39592861740092bbfe0bcb632b0bc55fbde58ab1
-
SHA256
850ce005298ab95b563a50c0b95618d97bc4696e3fffddf12b06c25bf933bfb0
-
SHA512
ad501fd2ccf52740dc0c64bef085551f840f926b2f721923016ad0021420d541de2ec4f2298a1ef99715834aa13bf55717c3849f1c48f6da156d95e8c90ff5e4
-
SSDEEP
12288:hPYPfY7fsbKjfK9yK2kVM7Ta/UO42LMW2lNDCxNZP:hPYPgwbKjGyK2j6UqMWENDk
Static task
static1
Behavioral task
behavioral1
Sample
Transferencia.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Transferencia.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gamasof.com - Port:
587 - Username:
[email protected] - Password:
Mariana2020* - Email To:
[email protected]
Targets
-
-
Target
Transferencia.exe
-
Size
624KB
-
MD5
6c69b1778096564e9926f9cab8600031
-
SHA1
39592861740092bbfe0bcb632b0bc55fbde58ab1
-
SHA256
850ce005298ab95b563a50c0b95618d97bc4696e3fffddf12b06c25bf933bfb0
-
SHA512
ad501fd2ccf52740dc0c64bef085551f840f926b2f721923016ad0021420d541de2ec4f2298a1ef99715834aa13bf55717c3849f1c48f6da156d95e8c90ff5e4
-
SSDEEP
12288:hPYPfY7fsbKjfK9yK2kVM7Ta/UO42LMW2lNDCxNZP:hPYPgwbKjGyK2j6UqMWENDk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-