General
-
Target
50ed78b1eb11b242ed2a305d34b000cb.bin
-
Size
135KB
-
Sample
230826-bpmdtshf7v
-
MD5
dad663e4b133c10b59661fac63d9d846
-
SHA1
8d7da1208c476f65d29fcd820959c0236514ebf7
-
SHA256
4297690127d31446f04165718f266fa96ab7e349b3f54209865b9cf9de611db0
-
SHA512
9fdb70fa88129f050304b66c5d4a639a850a4aa8445b0915b51ded008dd111228af7d3991571360636c2a37409e26b042171f8ca58d1f1cf8bbf4485a4e6ab56
-
SSDEEP
3072:IZNheiQXmlA6d0ui9PHxps/j5mDu4n5pu2uScwPCDm:a2EA6dSZRGFmy45A2uScwSm
Static task
static1
Behavioral task
behavioral1
Sample
a35a34ff770aabda07c6820d69d7f941b8b866d2b60fde248bb5f949c43831dd.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
a35a34ff770aabda07c6820d69d7f941b8b866d2b60fde248bb5f949c43831dd.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sirisexpress.com - Port:
587 - Username:
[email protected] - Password:
SirisEmails@123 - Email To:
[email protected]
Targets
-
-
Target
a35a34ff770aabda07c6820d69d7f941b8b866d2b60fde248bb5f949c43831dd.exe
-
Size
293KB
-
MD5
50ed78b1eb11b242ed2a305d34b000cb
-
SHA1
7d2c0633172ee778d80fce4122b75697587880bf
-
SHA256
a35a34ff770aabda07c6820d69d7f941b8b866d2b60fde248bb5f949c43831dd
-
SHA512
e794b64ba557eab3bf3d577280f5e6b0ecbee3499c66919e88815b7e2e4d8dcb06a31dfb1c14a02da76606deeab9901473af248684c52259cce58bf53ed96942
-
SSDEEP
6144:p7zNGwdtSU33enO2663SMObh7rNYqBbrXSCi4BB7e7Sx0DeDOi/S:p7zNGwDSU+nOhbn7pbrXPi4BB2BDfia
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-