General
-
Target
675c08621280de1dfc6a60d16875ba24748c5d2a83f0de7dbab3ff705018c1fa
-
Size
696KB
-
Sample
231206-dzfp5sag87
-
MD5
c2d7fddc6acec94d4a0bc01d068e7195
-
SHA1
0be645ef89ea78d07c23f3f1294412c11600b30a
-
SHA256
675c08621280de1dfc6a60d16875ba24748c5d2a83f0de7dbab3ff705018c1fa
-
SHA512
68fc989c5f617205fab456a6b8e700bf7ba99366091635a34844f01365391f721fc6fb11c5dcc36b498c8cc70cecded37df8234f54b252a2a933e403452f79d0
-
SSDEEP
12288:hWl5nF8iZZlJNBo76Ls0HwnccIxOC4PeZNVRqdad0mh3XGIVTgwNmH4dqrlbY:0lHZnNBNslnfRC4mZNTd0mVGIVMwNmHC
Static task
static1
Behavioral task
behavioral1
Sample
675c08621280de1dfc6a60d16875ba24748c5d2a83f0de7dbab3ff705018c1fa.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
675c08621280de1dfc6a60d16875ba24748c5d2a83f0de7dbab3ff705018c1fa.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.etiketten.com.tr - Port:
587 - Username:
[email protected] - Password:
Satis2022+*! - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.etiketten.com.tr - Port:
587 - Username:
[email protected] - Password:
Satis2022+*!
Targets
-
-
Target
675c08621280de1dfc6a60d16875ba24748c5d2a83f0de7dbab3ff705018c1fa
-
Size
696KB
-
MD5
c2d7fddc6acec94d4a0bc01d068e7195
-
SHA1
0be645ef89ea78d07c23f3f1294412c11600b30a
-
SHA256
675c08621280de1dfc6a60d16875ba24748c5d2a83f0de7dbab3ff705018c1fa
-
SHA512
68fc989c5f617205fab456a6b8e700bf7ba99366091635a34844f01365391f721fc6fb11c5dcc36b498c8cc70cecded37df8234f54b252a2a933e403452f79d0
-
SSDEEP
12288:hWl5nF8iZZlJNBo76Ls0HwnccIxOC4PeZNVRqdad0mh3XGIVTgwNmH4dqrlbY:0lHZnNBNslnfRC4mZNTd0mVGIVMwNmHC
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-