General
-
Target
db2a204d6286ccff77412f38fcb2233480283faf9a7e33efae6aa15a26b1539c
-
Size
2.1MB
-
Sample
231207-rmw39abg84
-
MD5
3e6d723d92d5ed87e3e7b380d8e8307e
-
SHA1
70e7e2662d5d02dcce846a04499de49ad868817e
-
SHA256
db2a204d6286ccff77412f38fcb2233480283faf9a7e33efae6aa15a26b1539c
-
SHA512
f4b6b2c74691043bbb552508a29bd0c14ad004a4606e0814c9fb15c28f51feb4575ce3e81dbec2bdfa6cb0b0b79f4cb88bd30bc969b52bd749769754bb6cbcdc
-
SSDEEP
49152:jh/lHKoueda5jRM97lqpcr3W7+MpvskY1aNAEn3+:OolWiHEnu
Static task
static1
Behavioral task
behavioral1
Sample
db2a204d6286ccff77412f38fcb2233480283faf9a7e33efae6aa15a26b1539c.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
db2a204d6286ccff77412f38fcb2233480283faf9a7e33efae6aa15a26b1539c.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.cyber.net.pk - Port:
587 - Username:
[email protected] - Password:
?df398ee6
Extracted
agenttesla
Protocol: smtp- Host:
mail.cyber.net.pk - Port:
587 - Username:
[email protected] - Password:
?df398ee6 - Email To:
[email protected]
Targets
-
-
Target
db2a204d6286ccff77412f38fcb2233480283faf9a7e33efae6aa15a26b1539c
-
Size
2.1MB
-
MD5
3e6d723d92d5ed87e3e7b380d8e8307e
-
SHA1
70e7e2662d5d02dcce846a04499de49ad868817e
-
SHA256
db2a204d6286ccff77412f38fcb2233480283faf9a7e33efae6aa15a26b1539c
-
SHA512
f4b6b2c74691043bbb552508a29bd0c14ad004a4606e0814c9fb15c28f51feb4575ce3e81dbec2bdfa6cb0b0b79f4cb88bd30bc969b52bd749769754bb6cbcdc
-
SSDEEP
49152:jh/lHKoueda5jRM97lqpcr3W7+MpvskY1aNAEn3+:OolWiHEnu
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-