General
-
Target
97fd0ea2f2ebe8dc9decafa546e62a5225feca31893c1e1dd820540d4211a594_JC.exe
-
Size
701KB
-
Sample
230826-sfm3fadb9y
-
MD5
81d1d9cf8554391462923fb0cc59bd99
-
SHA1
85a80bd672c95adf95a846d9866376b06607c0ef
-
SHA256
97fd0ea2f2ebe8dc9decafa546e62a5225feca31893c1e1dd820540d4211a594
-
SHA512
8084b99f3fa4f2a66b4b24d76711c8300db6ffeccc75eaca5f8dc7a379a6055b5bef0f104e32f3b525a8a61ebdd23aac1a012f3e7b594152847e15fbe9987547
-
SSDEEP
12288:2Iql3qaz3KVcgN72g1g361TEp+N/NpiJna7QMaF/90Qhtz3VU60S9bjGP:6NjuqM72g1gcI0N/WEpS9qzwbj
Static task
static1
Behavioral task
behavioral1
Sample
97fd0ea2f2ebe8dc9decafa546e62a5225feca31893c1e1dd820540d4211a594_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
97fd0ea2f2ebe8dc9decafa546e62a5225feca31893c1e1dd820540d4211a594_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.pingente.pt - Port:
587 - Username:
[email protected] - Password:
Pingente#2o21
Extracted
agenttesla
Protocol: smtp- Host:
mail.pingente.pt - Port:
587 - Username:
[email protected] - Password:
Pingente#2o21 - Email To:
[email protected]
Targets
-
-
Target
97fd0ea2f2ebe8dc9decafa546e62a5225feca31893c1e1dd820540d4211a594_JC.exe
-
Size
701KB
-
MD5
81d1d9cf8554391462923fb0cc59bd99
-
SHA1
85a80bd672c95adf95a846d9866376b06607c0ef
-
SHA256
97fd0ea2f2ebe8dc9decafa546e62a5225feca31893c1e1dd820540d4211a594
-
SHA512
8084b99f3fa4f2a66b4b24d76711c8300db6ffeccc75eaca5f8dc7a379a6055b5bef0f104e32f3b525a8a61ebdd23aac1a012f3e7b594152847e15fbe9987547
-
SSDEEP
12288:2Iql3qaz3KVcgN72g1g361TEp+N/NpiJna7QMaF/90Qhtz3VU60S9bjGP:6NjuqM72g1gcI0N/WEpS9qzwbj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-