General
-
Target
ec550aefc2e181061c23fb13952c24e7de75dbd547238119095912baeec139f0
-
Size
564KB
-
Sample
231107-s7cqsacg45
-
MD5
d2bf350ea2e4e615d26a7d7b99ee2033
-
SHA1
fe17671068b271d67c6eed8ae151b230291677f2
-
SHA256
ec550aefc2e181061c23fb13952c24e7de75dbd547238119095912baeec139f0
-
SHA512
5f42ccb2bb4c51029268055915d03280b0e162a571deffdef4e43764f6781f6f27b375ab9d0b23532f640fd1b4b96630ede39e7543caff957bf08b9a8b3bf27b
-
SSDEEP
12288:BQ3v8jldr5biRmEiPeINX32+v333OKvs7OvsD4jPzEfuaRU:Iuf5ymNPbmKeKvs9D0PiuT
Static task
static1
Behavioral task
behavioral1
Sample
Remittance Advice.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
Remittance Advice.exe
Resource
win10v2004-20231025-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.lubdub.com - Port:
587 - Username:
[email protected] - Password:
J-y!2e_fWMH_XP8F_008 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.lubdub.com - Port:
587 - Username:
[email protected] - Password:
J-y!2e_fWMH_XP8F_008
Targets
-
-
Target
Remittance Advice.exe
-
Size
582KB
-
MD5
8d2126ae79aef51c34567fa4031e504c
-
SHA1
99724725807731fdba5b82abb3f060092e46a1ef
-
SHA256
4936f57a5372bb5ac361fe78e175e350be8dcb551f1df710e37516f9530f93de
-
SHA512
fcb35ca2bda59d6ac4bca54fa3003a7037284c861d70f9ffe6c5264678c79f1fd39f92c7dc7409458bb45eaa787f0ca49f0b4f5030e0b9bf64b632bddac69da3
-
SSDEEP
12288:JcRbVjtXUY5HiPe6Uv33zOAPs74vsD4je99AtLVPa:J+bR5UHYiAPsLD+tLVP
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-