General
-
Target
8cb2647b24754e94c09a29438e2f49a2d55f0b772f8f013f5b90dcbfe8f957d8.exe
-
Size
703KB
-
Sample
231206-vv9k4afg4y
-
MD5
e578a1f547aa0fe425455661c09c8191
-
SHA1
5351a3caa604e8c54c9cddda3886bc21e7785c37
-
SHA256
8cb2647b24754e94c09a29438e2f49a2d55f0b772f8f013f5b90dcbfe8f957d8
-
SHA512
350f9dfb4992ecbd88a6318fdd5fac3305c44abf5c2c18b4cac753e42abbf97a9fed8762cdeef11769c3d9855093656fa90fdb308523f86435592c9631df168e
-
SSDEEP
12288:gHl5nF8dVdqrlbD+aWGXWYkwDOMNQ2luSn0y89inwoa6Y6bxlN6lbHILlzkWV:wlYqhbD+aWfYJ5n0nsav61lNILQlzk8
Static task
static1
Behavioral task
behavioral1
Sample
8cb2647b24754e94c09a29438e2f49a2d55f0b772f8f013f5b90dcbfe8f957d8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8cb2647b24754e94c09a29438e2f49a2d55f0b772f8f013f5b90dcbfe8f957d8.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.kivuresort.co.ke - Port:
587 - Username:
[email protected] - Password:
Kivu@2020 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.kivuresort.co.ke - Port:
587 - Username:
[email protected] - Password:
Kivu@2020
Targets
-
-
Target
8cb2647b24754e94c09a29438e2f49a2d55f0b772f8f013f5b90dcbfe8f957d8.exe
-
Size
703KB
-
MD5
e578a1f547aa0fe425455661c09c8191
-
SHA1
5351a3caa604e8c54c9cddda3886bc21e7785c37
-
SHA256
8cb2647b24754e94c09a29438e2f49a2d55f0b772f8f013f5b90dcbfe8f957d8
-
SHA512
350f9dfb4992ecbd88a6318fdd5fac3305c44abf5c2c18b4cac753e42abbf97a9fed8762cdeef11769c3d9855093656fa90fdb308523f86435592c9631df168e
-
SSDEEP
12288:gHl5nF8dVdqrlbD+aWGXWYkwDOMNQ2luSn0y89inwoa6Y6bxlN6lbHILlzkWV:wlYqhbD+aWfYJ5n0nsav61lNILQlzk8
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-