General
-
Target
b4505984575d9ea01e84c1d68b9a4bf2320af90570d05e4e73cbe3778a02e959
-
Size
842KB
-
Sample
231205-whqswsea79
-
MD5
f918266716676393150c923659f80e79
-
SHA1
24083ba3b3ef71e4e4999c19bfcdd79046db54dd
-
SHA256
b4505984575d9ea01e84c1d68b9a4bf2320af90570d05e4e73cbe3778a02e959
-
SHA512
72ea1edef4480c046800d69deab32b1a40b3443dd4dd0a5c1ab00e971eb1dcbc34434501eea97c574e8d7510efc9ee75cd75b4b4c189da47439e917c20b3d477
-
SSDEEP
24576:N0pk+pJIdmMDwTWHfCn5/KzyXEHSVq51:aFJIdmMDwTWHfCn5CGG
Static task
static1
Behavioral task
behavioral1
Sample
b4505984575d9ea01e84c1d68b9a4bf2320af90570d05e4e73cbe3778a02e959.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
b4505984575d9ea01e84c1d68b9a4bf2320af90570d05e4e73cbe3778a02e959.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.telefoonreparatiebovenkarspel.nl - Port:
587 - Username:
[email protected] - Password:
Madarjan007!
Extracted
agenttesla
Protocol: smtp- Host:
mail.telefoonreparatiebovenkarspel.nl - Port:
587 - Username:
[email protected] - Password:
Madarjan007! - Email To:
[email protected]
Targets
-
-
Target
b4505984575d9ea01e84c1d68b9a4bf2320af90570d05e4e73cbe3778a02e959
-
Size
842KB
-
MD5
f918266716676393150c923659f80e79
-
SHA1
24083ba3b3ef71e4e4999c19bfcdd79046db54dd
-
SHA256
b4505984575d9ea01e84c1d68b9a4bf2320af90570d05e4e73cbe3778a02e959
-
SHA512
72ea1edef4480c046800d69deab32b1a40b3443dd4dd0a5c1ab00e971eb1dcbc34434501eea97c574e8d7510efc9ee75cd75b4b4c189da47439e917c20b3d477
-
SSDEEP
24576:N0pk+pJIdmMDwTWHfCn5/KzyXEHSVq51:aFJIdmMDwTWHfCn5CGG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-