General
-
Target
716aec1f95797296faea4ecd447460c3.dat
-
Size
607KB
-
Sample
230917-ms49lacc23
-
MD5
716aec1f95797296faea4ecd447460c3
-
SHA1
9ec57fea6463e0eb57b0af11d83ff37a98298b08
-
SHA256
a7720d9c99b8af7fa344abd0bd8c03651058765dd2599af1e49edccefc51bc3e
-
SHA512
fcbb8fdbf776eb8503706aa5f2a66a65ec1db978e6c9bbe44834dfb67988f3415dadd8e5638c08f05a33fdbf7c930e954e065b25f55f03ba0047fb88f329433c
-
SSDEEP
12288:ZPXOVL4UUTV8FGmghbsOTh5RWWI8RMnXrJUsLBmpc8VZt9lRNQyq1DJK4c:ZPXOVcUUTGZghbsWasqXrJUsd6Xt9lv9
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Quotation.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mggroupfinland.fi - Port:
587 - Username:
[email protected] - Password:
Amiramggroup@ - Email To:
[email protected]
Targets
-
-
Target
Quotation.exe
-
Size
693KB
-
MD5
3cbf764a1a2e7ef8b67e3866440ef5b2
-
SHA1
459444abc519fb5611bb9821cb8dadb427709f68
-
SHA256
8cd22dab819e345e17da77ecd66073f7a5ca572254f2b61af89c6b4a24d855d1
-
SHA512
4f99cec24e368800da59adc26709352e81e272aaf9717281eab9021e98da1e96d98f332079309a0e701dc3af9b528c3411f6904c42762b85ec11f15e9a3bb12d
-
SSDEEP
12288:Iq8RG2iNEanaRdAnSZvoZl7VqBS1rKy/02LYHfb/AfDsm82yAuxpvyrfD:IqqG1uKnSmZl7VZ1rF0db/AfDs2fuxpI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-