General
-
Target
b1dd2f23a4e0925adcfe19c55bf701af33e6d3d66f3fd1537d30ea7ceddee9a4
-
Size
614KB
-
Sample
230801-m39xtsfd52
-
MD5
664f4735aaad4babd8c6ab8abe20e4ce
-
SHA1
49c2af2ed1aa17e2f6f20b0ae734c2deb9ce4d41
-
SHA256
b1dd2f23a4e0925adcfe19c55bf701af33e6d3d66f3fd1537d30ea7ceddee9a4
-
SHA512
612a2219191aad0f1836792ace0b3c30a5c5f105daf8f6b84aeff28b029d73e99013b78df08ef7236757028871538dc287befc84bacf4f33687e10e9e5a17711
-
SSDEEP
12288:U2Vv6NZXET/njuf5viFypbVjlrC9ts9UFfFZaMNVAkY8ZDX7F7s3:lCv0jicUC6on3UkY8w
Static task
static1
Behavioral task
behavioral1
Sample
b1dd2f23a4e0925adcfe19c55bf701af33e6d3d66f3fd1537d30ea7ceddee9a4.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
kV$bSqJ1 daniel - Email To:
[email protected]
Targets
-
-
Target
b1dd2f23a4e0925adcfe19c55bf701af33e6d3d66f3fd1537d30ea7ceddee9a4
-
Size
614KB
-
MD5
664f4735aaad4babd8c6ab8abe20e4ce
-
SHA1
49c2af2ed1aa17e2f6f20b0ae734c2deb9ce4d41
-
SHA256
b1dd2f23a4e0925adcfe19c55bf701af33e6d3d66f3fd1537d30ea7ceddee9a4
-
SHA512
612a2219191aad0f1836792ace0b3c30a5c5f105daf8f6b84aeff28b029d73e99013b78df08ef7236757028871538dc287befc84bacf4f33687e10e9e5a17711
-
SSDEEP
12288:U2Vv6NZXET/njuf5viFypbVjlrC9ts9UFfFZaMNVAkY8ZDX7F7s3:lCv0jicUC6on3UkY8w
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-