General
-
Target
ORDERS.zip
-
Size
678KB
-
Sample
230829-skg2zsgc4w
-
MD5
117a5d382e9213355493bec05e49d218
-
SHA1
ea862ed0b4f37dec1505e47b58abb3601b31c287
-
SHA256
294df2fa74ab3b8907d096dafedac05200cc82c725fe3b8b4b78642aad013ec0
-
SHA512
f2b85d678b3cef3c7758038b2337ec4953103642b22c3af8c50f04f300b21a78f5dcf915f0cd4fa4ae8298466705ab64b0900898aacaa3980811db94a3324ad0
-
SSDEEP
12288:NptcrdhNzT/rzZrpbRv0lENqYzhApVQZ8bogX6j/vpRxx07DR1HfBoRpm06:hcrV7FrpbRv0lEYKQa8b1cvw7DHBEp96
Static task
static1
Behavioral task
behavioral1
Sample
kTg1jSEh7699WIj.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
kTg1jSEh7699WIj.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.resaleroffice.com - Port:
587 - Username:
[email protected] - Password:
ruben000 - Email To:
[email protected]
Targets
-
-
Target
kTg1jSEh7699WIj.exe
-
Size
711KB
-
MD5
85e8c0d50d714e0e0102724f2abe9965
-
SHA1
a0b8e27c0e6e905cc34c62f39a544973d7b17a7e
-
SHA256
d80553d0154e6796beb27196164a28db62c57be2fc5033678d08510da2bfb732
-
SHA512
5ce6713dab212c22170dce6751672b3c73f3ee3cc06dff24b74efe7e0f8ca96c88b7f5b44a405a6f80df536347c3da51460a7a05f88199ac592b7021e531e1a1
-
SSDEEP
12288:V0dC0hj45NEd5KAhjwUNNOlElUYzhAV7QZ8boQX6/0qCYpEPNoaHmoN+F:V0QSjuNEd5KoulEmKWY8bLe0spkoZ6+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-