General
-
Target
a331d8169961a13fabdff8a264ff22687770e49794d63b9ac526055c8c929b1f
-
Size
587KB
-
Sample
231208-ccjmvagf45
-
MD5
1ec275d581b7efc115153bb6a8915ba5
-
SHA1
869acb34500897d1d9ebe06bf3f52eeaeb8c1eaa
-
SHA256
a331d8169961a13fabdff8a264ff22687770e49794d63b9ac526055c8c929b1f
-
SHA512
001f23bea4fd2ae52fd88d01f1d9bf9539954ac3e02ae7b7dd0dcc9f57d1c9ac89f242a0128d2126313bd3099c40eb622516081298d98b2d05abdb805785d1c5
-
SSDEEP
6144:O8LxB3Qx8ayrbordY+VxuOveqXd0N+UMq1zSvEFWcbqX7TZPTvV3AWgbyG1aSmWD:GxPgUrdJE0Wx+YWc871PTWbHfmWPYMf
Static task
static1
Behavioral task
behavioral1
Sample
a331d8169961a13fabdff8a264ff22687770e49794d63b9ac526055c8c929b1f.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a331d8169961a13fabdff8a264ff22687770e49794d63b9ac526055c8c929b1f.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: smtp- Host:
premium185.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
cooldown2013
Targets
-
-
Target
a331d8169961a13fabdff8a264ff22687770e49794d63b9ac526055c8c929b1f
-
Size
587KB
-
MD5
1ec275d581b7efc115153bb6a8915ba5
-
SHA1
869acb34500897d1d9ebe06bf3f52eeaeb8c1eaa
-
SHA256
a331d8169961a13fabdff8a264ff22687770e49794d63b9ac526055c8c929b1f
-
SHA512
001f23bea4fd2ae52fd88d01f1d9bf9539954ac3e02ae7b7dd0dcc9f57d1c9ac89f242a0128d2126313bd3099c40eb622516081298d98b2d05abdb805785d1c5
-
SSDEEP
6144:O8LxB3Qx8ayrbordY+VxuOveqXd0N+UMq1zSvEFWcbqX7TZPTvV3AWgbyG1aSmWD:GxPgUrdJE0Wx+YWc871PTWbHfmWPYMf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-