General
-
Target
a47c1485f55f17b214f93da9b1235026dfa4e963f2a47203118491546d74e2ec
-
Size
479KB
-
Sample
230823-my8h7sbf32
-
MD5
eb6376ea1772ae9f2849f268a395d990
-
SHA1
d686e6b17530e2e266ecab6ff85b12f3b1cdc58f
-
SHA256
a47c1485f55f17b214f93da9b1235026dfa4e963f2a47203118491546d74e2ec
-
SHA512
85609872d66d18c0ebd4bfabcf67e7b1a7934bfb3e83fb24373e3ebb7e09fa7752da91d6b1567ed98db88fd44298f9ea8c796a37c61335eeee82d29443a35dfc
-
SSDEEP
12288:3D8UGypISTAd+CFTbmDcMr1Of6f2LO0E+tD+kv:3wUVpIwfCRiDcMr1ykcO0TDz
Static task
static1
Behavioral task
behavioral1
Sample
a47c1485f55f17b214f93da9b1235026dfa4e963f2a47203118491546d74e2ec.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a47c1485f55f17b214f93da9b1235026dfa4e963f2a47203118491546d74e2ec.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.hay-tek.com - Port:
587 - Username:
[email protected] - Password:
Hytkmk142+ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.hay-tek.com - Port:
587 - Username:
[email protected] - Password:
Hytkmk142+
Targets
-
-
Target
a47c1485f55f17b214f93da9b1235026dfa4e963f2a47203118491546d74e2ec
-
Size
479KB
-
MD5
eb6376ea1772ae9f2849f268a395d990
-
SHA1
d686e6b17530e2e266ecab6ff85b12f3b1cdc58f
-
SHA256
a47c1485f55f17b214f93da9b1235026dfa4e963f2a47203118491546d74e2ec
-
SHA512
85609872d66d18c0ebd4bfabcf67e7b1a7934bfb3e83fb24373e3ebb7e09fa7752da91d6b1567ed98db88fd44298f9ea8c796a37c61335eeee82d29443a35dfc
-
SSDEEP
12288:3D8UGypISTAd+CFTbmDcMr1Of6f2LO0E+tD+kv:3wUVpIwfCRiDcMr1ykcO0TDz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-