General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.19646.4001.exe
-
Size
592KB
-
Sample
231122-ewc1hsab32
-
MD5
f47f0b19aa1b7da2c0aada9c1ef4aafd
-
SHA1
6bdb08f4a10500b5f40b5fe9593b9e2e85ce07d3
-
SHA256
f2de84e7165d6d0e8111cb65b54684944f6d822fcd2f6e3c362a7846b852e8b7
-
SHA512
1952a75ef7e9bf1b7bee894ef16e892576edeac4d21480e117e344404cefefd2e6c2f13bb0b48c4bb532339fa40da650fb4b74196021e43033fd29e351843c77
-
SSDEEP
12288:nXVy8opV12SLsIHbflPFZ1dW6j3yxv9BLtIJ3rJIiBg6qTA+9+l:XVF2VUSwelPFH03Ltk3rKiKGo+l
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.19646.4001.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.19646.4001.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.industrialgh.com - Port:
587 - Username:
[email protected] - Password:
BillionPay$
Extracted
agenttesla
Protocol: smtp- Host:
mail.industrialgh.com - Port:
587 - Username:
[email protected] - Password:
BillionPay$ - Email To:
[email protected]
Targets
-
-
Target
SecuriteInfo.com.Win32.PWSX-gen.19646.4001.exe
-
Size
592KB
-
MD5
f47f0b19aa1b7da2c0aada9c1ef4aafd
-
SHA1
6bdb08f4a10500b5f40b5fe9593b9e2e85ce07d3
-
SHA256
f2de84e7165d6d0e8111cb65b54684944f6d822fcd2f6e3c362a7846b852e8b7
-
SHA512
1952a75ef7e9bf1b7bee894ef16e892576edeac4d21480e117e344404cefefd2e6c2f13bb0b48c4bb532339fa40da650fb4b74196021e43033fd29e351843c77
-
SSDEEP
12288:nXVy8opV12SLsIHbflPFZ1dW6j3yxv9BLtIJ3rJIiBg6qTA+9+l:XVF2VUSwelPFH03Ltk3rKiKGo+l
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-