General
-
Target
6958207d220f5e4779476143888ecc491ff86ae881e74dd1791dc5f7b57ee096.img
-
Size
1.2MB
-
Sample
231202-k5pzbsbb43
-
MD5
f9b1a13cd14eaba6c7e18dd17a2d274c
-
SHA1
bcecb8013d3fdc4715789eb20e91f2e7fa22fa54
-
SHA256
6958207d220f5e4779476143888ecc491ff86ae881e74dd1791dc5f7b57ee096
-
SHA512
b9571e87cab4fe78bc88d22de0e18137a0c315b8dbcaf3d4cd2589272ae31c97e867a20ea6b9f4082c31415692ab26917bfe15222927a20a01188f80b763d83d
-
SSDEEP
24576:T1uC5JT92RkNSIXtzdf1ZOS0e42xWVYknV3G/Z:8KfRdtsS0e4GIV3GR
Behavioral task
behavioral1
Sample
Rybkdr.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Rybkdr.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.asiaparadisehotel.com - Port:
587 - Username:
[email protected] - Password:
S,i*jv&Bj09k - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.asiaparadisehotel.com - Port:
587 - Username:
[email protected] - Password:
S,i*jv&Bj09k
Targets
-
-
Target
Rybkdr.exe
-
Size
1.1MB
-
MD5
d6393631100d7160ca348397cb01943d
-
SHA1
3ff0803ae9fd31efc74bcb29006c1cbf29b03f75
-
SHA256
eea977d6c736325a557a0c31552c49c51399748fc138db772735109fb6510757
-
SHA512
efef9bd64c68757c762a2fdbeb21cc6fc504b85dfd4f468b13504b00b365b58cd83aad3dbbc1cc12c8688d74777d69d6e09685cc9310a0cd29885f6a74fea576
-
SSDEEP
24576:X1uC5JT92RkNSIXtzdf1ZOS0e42xWVYknV3G/Z:AKfRdtsS0e4GIV3GR
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect PureLogs payload
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-