General
-
Target
16102023_2203_16102023_JABIL10934.rar
-
Size
607KB
-
Sample
231016-rcndcsaa87
-
MD5
086c03d37a473c990d98aec0a7c1d419
-
SHA1
19e143a4847c7f86538e18f3c3e4844347bf6694
-
SHA256
5aa44581c04f3bf936307d391ef576a56363b17b9143581f0db7a3a73d6d4cb1
-
SHA512
f2b564f1a3c523e69cbeebc6edc2a91d95c27e5683604c5aab80e69273379b9dd003bb3ef977045006b816d412f00e037bd852f53300b3f0ecbf551c44a665bc
-
SSDEEP
12288:aVNt0j9GgJB93hvfFL0D0y4sv3GWvBjRs1l15yrqlumo/8xOdGA5FM46I:abG0KBTf9G0xEv9G1Z4R/8xOBrM0
Static task
static1
Behavioral task
behavioral1
Sample
JABIL10934.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JABIL10934.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.officeemailbackup.com - Port:
587 - Username:
[email protected] - Password:
PL*W)YFtXd_p - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.officeemailbackup.com - Port:
587 - Username:
[email protected] - Password:
PL*W)YFtXd_p
Targets
-
-
Target
JABIL10934.exe
-
Size
656KB
-
MD5
4aad6c5dc332341a5196eea6041d2670
-
SHA1
90f0686b2ff711345636a40a838e8f362182eeaf
-
SHA256
75f4b3f3428602942cfc972086e7d2a4ba358610430f1f7b9f3d73b5991d7337
-
SHA512
7c3ab91ac0ff187fced832e611608b4153a1b4ae1e0102a36bd6273dc96ebe68835483aadc29107639833f569495c7aba26d6c36e001382febda8d57aa21b5eb
-
SSDEEP
12288:zzfqBYsVbFTtD238zVwSOnOxafXSW9ulFx8t8o+ZtLAp+r01+:zT6Ymq8zV7O1p9ulr8OtLG+
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-