General
-
Target
z15Payment27_06_2023.exe
-
Size
644KB
-
Sample
231011-ng3gasdd85
-
MD5
321850c5a150f6fa4adab3b1772169f3
-
SHA1
65311a6c52e86cdc07bbc4897defb46d79f26698
-
SHA256
e068262e4c1807050558428bab480871a43ceb983ab6c427454ffcb1a205aafa
-
SHA512
80934ca8ce8e579fd670a583950ac17dcb58c399a877375ae4a815958ecdda6e2c22a06e78504f119ee6e9099534c11c56d5154bfb82e853882269bd43f1ce9a
-
SSDEEP
12288:A2iNMyiRJU/Wcuf+w/FltbzfJSTROpto1WASZZyE/NrqzZhnDENgTUcxSj0p6:A1FFeNT/FlpqROpkWA+d/NrcZN4sSjO6
Static task
static1
Behavioral task
behavioral1
Sample
z15Payment27_06_2023.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
z15Payment27_06_2023.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.kiequiprosmedicos.com - Port:
587 - Username:
[email protected] - Password:
V3nta5dav - Email To:
[email protected]
Targets
-
-
Target
z15Payment27_06_2023.exe
-
Size
644KB
-
MD5
321850c5a150f6fa4adab3b1772169f3
-
SHA1
65311a6c52e86cdc07bbc4897defb46d79f26698
-
SHA256
e068262e4c1807050558428bab480871a43ceb983ab6c427454ffcb1a205aafa
-
SHA512
80934ca8ce8e579fd670a583950ac17dcb58c399a877375ae4a815958ecdda6e2c22a06e78504f119ee6e9099534c11c56d5154bfb82e853882269bd43f1ce9a
-
SSDEEP
12288:A2iNMyiRJU/Wcuf+w/FltbzfJSTROpto1WASZZyE/NrqzZhnDENgTUcxSj0p6:A1FFeNT/FlpqROpkWA+d/NrcZN4sSjO6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-