General
-
Target
2813e882b91cad5d823ecdd539ac84de.bin
-
Size
334KB
-
Sample
230831-blt99scb55
-
MD5
160ff9cdda78ad25663f1e9bb37d39a4
-
SHA1
2f366f22e00888f89c8024321612b8bb42f06054
-
SHA256
091e5a25bf29f9deeb06524170ce2e5ceac741e41f270e01df9e9358899b10c6
-
SHA512
d14925f25d383849cd6c39f47f75da37ceced139948cf844dd28ee7a43c63b00785ef13c07ff5b7d63e567bf4fb7eccc3dcdfa70da9bbaf493a0b383f827d3da
-
SSDEEP
6144:53owRPBm+5t/a6xHbQgRnbj1j5qudZfapqpESUug63xoochaDuDjmO3L/aDmeDLG:5Y8VyWbtLFqIfSqpDUk3jDuDhO5D8dSy
Static task
static1
Behavioral task
behavioral1
Sample
8a6bb908578673c427b94360e93909c21ae1e69a09f0378bf2d2ab3f43cf60a6.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8a6bb908578673c427b94360e93909c21ae1e69a09f0378bf2d2ab3f43cf60a6.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.tandaauk.com - Port:
587 - Username:
[email protected] - Password:
goodfree@@ - Email To:
[email protected]
Targets
-
-
Target
8a6bb908578673c427b94360e93909c21ae1e69a09f0378bf2d2ab3f43cf60a6.exe
-
Size
820KB
-
MD5
2813e882b91cad5d823ecdd539ac84de
-
SHA1
c1e3d38945744133d009665c6a2ea5b5e112d0f3
-
SHA256
8a6bb908578673c427b94360e93909c21ae1e69a09f0378bf2d2ab3f43cf60a6
-
SHA512
60261a846b5c29db2aabbb048fce0896534b10aece7129c0cf346c501b916e3783264711d9aa686c4726ead143729fc7c576d8c51f2cabcf914c92df8f9c149a
-
SSDEEP
12288:l+KhznbK+ZFnnFnuoc/a8NRP1tscW2f7R3lu/C6mwlial4jILd4jNJPKT:MIT2qeNRP1tscWIf6Dgc2B2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-