General
-
Target
40e55d317d745a766fcddf1696030e2dfff6ce54685cf85b6f20c6a978e58632
-
Size
727KB
-
Sample
231204-j7f9jahh82
-
MD5
8e968bf5eca5b8cd5bd213144a65cb60
-
SHA1
2157cf7e1bc6e0d798e61b3b9ba3f34d6c717660
-
SHA256
40e55d317d745a766fcddf1696030e2dfff6ce54685cf85b6f20c6a978e58632
-
SHA512
b115ed6c4dea5fe2c9005eb21f7fc1956502fc7d3e79f8d433dc70fb9c24a7626f5713f714d982129116ca1b7a732f8b8e53ecf0113041850f5bed04ca5788ad
-
SSDEEP
12288:2Ihrz56hQpN55TWQblAw5ja5JvqPgkRmsj4yu/d6gvw9/QuRszqDB5WJjeoKJJ0q:OQ55aQBAWjaPi4+9qlw9IuO6B5WJrKJf
Static task
static1
Behavioral task
behavioral1
Sample
chima.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
chima.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.acestar.com.ph - Port:
587 - Username:
[email protected] - Password:
cssubic@12345 - Email To:
[email protected]
Targets
-
-
Target
chima.exe
-
Size
812KB
-
MD5
9fdc58e77c21bdc493d017806c814791
-
SHA1
87d45946cb600a4c1bcb30269187124c5fa0e8d1
-
SHA256
f17888c39de05db240eac5f53edc8ad9c1b1512c428dfcce5078bb9636395a8d
-
SHA512
104b1ac6a5dde7bbff09fd40589e2ff7bae999901b7eaa6ba5cb5419112fdd206a2c78445425a63905223e7d014250f2d4dd69a64820166f6be56996bb8a8337
-
SSDEEP
12288:WWytW8G34/uK45+po2cOe9aPgt4npNKacCeIvzMGD1tkChTlCoXtn70IQIVAxqn:l34/up+pJw6BnpgacCeIlDZTlHdndwx
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-