General
-
Target
d158b9c86d15735ad680bb854a398c63ad9ff4ae7bee57ac1c495cd46bcedb57
-
Size
462KB
-
Sample
230830-jc5cwade5t
-
MD5
11b67b094982ad3471970133de1fc3a5
-
SHA1
c8b8fa589caedea89e53494df77dc54a7e2876e0
-
SHA256
d158b9c86d15735ad680bb854a398c63ad9ff4ae7bee57ac1c495cd46bcedb57
-
SHA512
0202b8f7b182d5e050ed6de6290d281ca5444133f45715c55dc249e91e22860c4f54de9c3fec06490814bd27a9edd3bdbe45425e9034930c606bfa74bc1cf852
-
SSDEEP
12288:U+0zNPvEMgHfLh5Xyqa2C2v+ia/7eE4yA2fLmt1DrP/TsgRU7oavA:UPzNHXg/Lh5XyWGisKUAEG1Dzj04
Static task
static1
Behavioral task
behavioral1
Sample
FB-108N & FB-108NK 詢價 - 田勤.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
FB-108N & FB-108NK 詢價 - 田勤.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ditelcomltda.com - Port:
587 - Username:
[email protected] - Password:
D1telc0mLtda - Email To:
[email protected]
Targets
-
-
Target
FB-108N & FB-108NK 詢價 - 田勤.exe
-
Size
476KB
-
MD5
503e9936a39929b17392f57e75e57676
-
SHA1
e69543ce8746377cc08eaeff376027c34f5ed61d
-
SHA256
2c34bfc1850ed733173329e35f6ccebaaf9f279beeb84c76f86f4b3b7badf3e0
-
SHA512
69aa5fd6b640bf17896b3b965270ca56e6460ce55c95a460aae6672243009f91f02fd278fe9eb5253c94e4ade6d8572b45c6cbfd43a704814ecfef83c22c68fc
-
SSDEEP
12288:Qv6uzNPg1P2dfKuZMW4cBurCviFpKPvrP/Ts6Rs76a2:QvBzNuPfuXtaYiFU3zzQY
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-