General
-
Target
8nNjOOKbudRGqnT.exe
-
Size
636KB
-
Sample
231203-smwcdscd47
-
MD5
5a39cd5584578108a3b6e71a718c438d
-
SHA1
397310fd5f476b85bec9c8c2cdbc938f1d1988af
-
SHA256
d7836343c72fba0c84b9616612756f1b6bd4ba0187180c84836dbcfdbd0dff75
-
SHA512
b8d300cba2c75f57d2120ed5c308e4fcec5dce7a4324abb2bbcfa2940fd3ac6e4a03aa5c07b01b1ccf927dbaefd3ed41beb20b73ac3cd6affd39d367c7d34847
-
SSDEEP
12288:qS/mzd7BR6wTVRWFbPQaC3Y1opjXGRWo+FUsUsOfsyAJnLFFEPepi:qS/mzpBjyPQaCo16jXSGOFtPAJn5i
Static task
static1
Behavioral task
behavioral1
Sample
8nNjOOKbudRGqnT.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
8nNjOOKbudRGqnT.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ovefood.com - Port:
587 - Username:
[email protected] - Password:
wvjjTGp9 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.ovefood.com - Port:
587 - Username:
[email protected] - Password:
wvjjTGp9
Targets
-
-
Target
8nNjOOKbudRGqnT.exe
-
Size
636KB
-
MD5
5a39cd5584578108a3b6e71a718c438d
-
SHA1
397310fd5f476b85bec9c8c2cdbc938f1d1988af
-
SHA256
d7836343c72fba0c84b9616612756f1b6bd4ba0187180c84836dbcfdbd0dff75
-
SHA512
b8d300cba2c75f57d2120ed5c308e4fcec5dce7a4324abb2bbcfa2940fd3ac6e4a03aa5c07b01b1ccf927dbaefd3ed41beb20b73ac3cd6affd39d367c7d34847
-
SSDEEP
12288:qS/mzd7BR6wTVRWFbPQaC3Y1opjXGRWo+FUsUsOfsyAJnLFFEPepi:qS/mzpBjyPQaCo16jXSGOFtPAJn5i
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-