General
-
Target
c56269fd74de127be075c010e45313d6461ea9d2d646ebdf13391f1c6409092b
-
Size
431KB
-
Sample
231208-cneg9saa2z
-
MD5
9c288c5fc24b5181810f8b3466dd7365
-
SHA1
80ced01c1a68080303efd61228d90090a693ec75
-
SHA256
c56269fd74de127be075c010e45313d6461ea9d2d646ebdf13391f1c6409092b
-
SHA512
a6e38328d32ef1d9b2c2d5ee292194e334f3625ffff8fc2593035a6bcf70ac4da109528795248f9f403157200d7c28b10b80de2b1679230c9d8113868059bff7
-
SSDEEP
12288:UhsklAKxbWfxyJUa28FIQcqD8ZsZbKFn56s3Z:UhVAKpWpyUT8F3cy8ebWosp
Static task
static1
Behavioral task
behavioral1
Sample
c56269fd74de127be075c010e45313d6461ea9d2d646ebdf13391f1c6409092b.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
c56269fd74de127be075c010e45313d6461ea9d2d646ebdf13391f1c6409092b.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: smtp- Host:
server1.sqsendy.shop - Port:
587 - Username:
[email protected] - Password:
{f];qthoiBBW
Extracted
agenttesla
Protocol: smtp- Host:
server1.sqsendy.shop - Port:
587 - Username:
[email protected] - Password:
{f];qthoiBBW - Email To:
[email protected]
Targets
-
-
Target
c56269fd74de127be075c010e45313d6461ea9d2d646ebdf13391f1c6409092b
-
Size
431KB
-
MD5
9c288c5fc24b5181810f8b3466dd7365
-
SHA1
80ced01c1a68080303efd61228d90090a693ec75
-
SHA256
c56269fd74de127be075c010e45313d6461ea9d2d646ebdf13391f1c6409092b
-
SHA512
a6e38328d32ef1d9b2c2d5ee292194e334f3625ffff8fc2593035a6bcf70ac4da109528795248f9f403157200d7c28b10b80de2b1679230c9d8113868059bff7
-
SSDEEP
12288:UhsklAKxbWfxyJUa28FIQcqD8ZsZbKFn56s3Z:UhVAKpWpyUT8F3cy8ebWosp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-