General
-
Target
18d6a7766721121d4b54f2b5eef76e17.exe
-
Size
695KB
-
Sample
230918-s8shmacf99
-
MD5
18d6a7766721121d4b54f2b5eef76e17
-
SHA1
2395e0a5b3980f283eaffee8302d8581dbdc6175
-
SHA256
e1453fb8c21b01fc95b2441e260e982516915d11c34c6e25f5208c173bed72df
-
SHA512
79982597e6b0c3d5b95745326d9be7203ccb66b2d7165b7c534f6fca49baeef5b9613d0d94f1196d5aadf294e152e0352b10f19330528e7d85f8894d54b090b8
-
SSDEEP
12288:XAfDuHOX+J+hlsYlt36ENuaxdPZcafD3uGw0PYNDWA2P01oDbJDAkqJaf6RMQZkg:XgkJ+hOYl5NuaxdRceulkYxWJ0YJMtP
Static task
static1
Behavioral task
behavioral1
Sample
18d6a7766721121d4b54f2b5eef76e17.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
18d6a7766721121d4b54f2b5eef76e17.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.lubdub.com - Port:
587 - Username:
[email protected] - Password:
J-y!2e_fWMH_XP8F_008 - Email To:
[email protected]
Targets
-
-
Target
18d6a7766721121d4b54f2b5eef76e17.exe
-
Size
695KB
-
MD5
18d6a7766721121d4b54f2b5eef76e17
-
SHA1
2395e0a5b3980f283eaffee8302d8581dbdc6175
-
SHA256
e1453fb8c21b01fc95b2441e260e982516915d11c34c6e25f5208c173bed72df
-
SHA512
79982597e6b0c3d5b95745326d9be7203ccb66b2d7165b7c534f6fca49baeef5b9613d0d94f1196d5aadf294e152e0352b10f19330528e7d85f8894d54b090b8
-
SSDEEP
12288:XAfDuHOX+J+hlsYlt36ENuaxdPZcafD3uGw0PYNDWA2P01oDbJDAkqJaf6RMQZkg:XgkJ+hOYl5NuaxdRceulkYxWJ0YJMtP
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-