General
-
Target
PRE ALERT NOTICE.exe
-
Size
320KB
-
Sample
231003-qw96ssch56
-
MD5
6b927159982881a36520009cb8aa923d
-
SHA1
806aaf5066dfc7b7d1261ff9b5155de23f45fb87
-
SHA256
65c423ef88f86b07c5429ab4ebc8c89b7d6c39a032e8b7465f7b84bac91d3da9
-
SHA512
128963f1e4712847d5c168b427ae8ede98dfc70124799f619057f3325e3a69df3d55abb6da3ed6164573482d377fcd0643d06149b8d9a52dfbf1fe2c7686586f
-
SSDEEP
6144:6Rgc2lOrSZPpLM3FZljVsiV3CNL+oP6+UJ+2TeFqtA4DaIt3kwObSC25C7H/c/d:EtjVsiQNKoy+UJ+2TeFqq4Da0YSC2efS
Static task
static1
Behavioral task
behavioral1
Sample
PRE ALERT NOTICE.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
PRE ALERT NOTICE.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.amtechcards.com - Port:
587 - Username:
[email protected] - Password:
puuAt8;(Y$NU - Email To:
[email protected]
Targets
-
-
Target
PRE ALERT NOTICE.exe
-
Size
320KB
-
MD5
6b927159982881a36520009cb8aa923d
-
SHA1
806aaf5066dfc7b7d1261ff9b5155de23f45fb87
-
SHA256
65c423ef88f86b07c5429ab4ebc8c89b7d6c39a032e8b7465f7b84bac91d3da9
-
SHA512
128963f1e4712847d5c168b427ae8ede98dfc70124799f619057f3325e3a69df3d55abb6da3ed6164573482d377fcd0643d06149b8d9a52dfbf1fe2c7686586f
-
SSDEEP
6144:6Rgc2lOrSZPpLM3FZljVsiV3CNL+oP6+UJ+2TeFqtA4DaIt3kwObSC25C7H/c/d:EtjVsiQNKoy+UJ+2TeFqq4Da0YSC2efS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-