General
-
Target
203b77e03c015bb3e23cf818bf31827a.exe
-
Size
729KB
-
Sample
230824-ccph4aaf3t
-
MD5
203b77e03c015bb3e23cf818bf31827a
-
SHA1
0b2d8c7e724bd69287a0cbdfc763cd1a448caed3
-
SHA256
b3a5d73b31d152222ab912e63ee126814f3c5c3fdcbdc50ad6772bc6bc867c7c
-
SHA512
d61f118ce0a4d79b4a6f6fbe8a9d4d5ad08ace1963dc7810f3a53a1d9032bb191c4256792b82c1a49625609286defbb1b5b03bbf31a97fdf3b5e11e3fd9a1028
-
SSDEEP
12288:sdfSRtw2lq3Pal3ZmtWbMMAM5JhXX+uDmtqKz5IXEJUXQ4hu3a58:st2lq3yNMtczJhXX+uKtqK5biXQ/
Static task
static1
Behavioral task
behavioral1
Sample
203b77e03c015bb3e23cf818bf31827a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
203b77e03c015bb3e23cf818bf31827a.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.timextradingplc.com - Port:
587 - Username:
[email protected] - Password:
M2021@timex
Extracted
agenttesla
Protocol: smtp- Host:
mail.timextradingplc.com - Port:
587 - Username:
[email protected] - Password:
M2021@timex - Email To:
[email protected]
Targets
-
-
Target
203b77e03c015bb3e23cf818bf31827a.exe
-
Size
729KB
-
MD5
203b77e03c015bb3e23cf818bf31827a
-
SHA1
0b2d8c7e724bd69287a0cbdfc763cd1a448caed3
-
SHA256
b3a5d73b31d152222ab912e63ee126814f3c5c3fdcbdc50ad6772bc6bc867c7c
-
SHA512
d61f118ce0a4d79b4a6f6fbe8a9d4d5ad08ace1963dc7810f3a53a1d9032bb191c4256792b82c1a49625609286defbb1b5b03bbf31a97fdf3b5e11e3fd9a1028
-
SSDEEP
12288:sdfSRtw2lq3Pal3ZmtWbMMAM5JhXX+uDmtqKz5IXEJUXQ4hu3a58:st2lq3yNMtczJhXX+uKtqK5biXQ/
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-