General
-
Target
ff1d598bd62f40bbe2dea0737be2fef7319fb655261b7323d362f2ffc30ae62b7z_JC.7z
-
Size
469KB
-
Sample
230815-wkgyrseg4x
-
MD5
a16d427569f078b3124aea10c7469b17
-
SHA1
2f041c08c0e028590e88a403b04e495f829e8705
-
SHA256
ff1d598bd62f40bbe2dea0737be2fef7319fb655261b7323d362f2ffc30ae62b
-
SHA512
53c131bed3d2b3e5397a2d3de55b6248a860e58c3d339c9a14e36d2e04bf35b186bd2394d7460a35b03100ef6b4fc7c1ffdab252db922f6d9ed4be1bacfb0600
-
SSDEEP
12288:r4+6MmnlL09PI5Rgd4VjxHAurYyQfEGzvKTH4E:rRXlI/g61HPrYyGEGzvKr7
Static task
static1
Behavioral task
behavioral1
Sample
PO 2100312939.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
PO 2100312939.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.msphc.org - Port:
587 - Username:
[email protected] - Password:
123cao456 - Email To:
[email protected]
Targets
-
-
Target
PO 2100312939.exe
-
Size
970KB
-
MD5
57cd72a887cca62b44190dabce0b7b5a
-
SHA1
f156897406aa8dbb2a2ed30d8176e8c5271a14b7
-
SHA256
985b9ac7e5d1bb43b27e335d0a280a09633a5798c30d9ebd4468d0eebe2b2cff
-
SHA512
92f21ac88e3884ad233f757e65a9cfa9fa9f929dfdab5af1a26944a1242f8da8b7cd9042b8a90f1d33e8202d6a9ad346cd90a3cfacd1376b3632fd139ec6bcbf
-
SSDEEP
24576:SzEn9wQOIpppupppppfyAIpppupppppfyIAflI/gK1J9rYycEGzvKC4Q:jn+lyAlyIWlI/xDrYnnziCh
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-