General
-
Target
9b2f54603183b1f465b3d7a28e9f8107d4c57021fa7a91f159f7f24d6137b69d
-
Size
193KB
-
Sample
231208-cqh88saa4x
-
MD5
42ea0f09f10cd535166fd15e1b85a786
-
SHA1
8a4c03d8bda5cdededadf51862b0317eec702a5f
-
SHA256
9b2f54603183b1f465b3d7a28e9f8107d4c57021fa7a91f159f7f24d6137b69d
-
SHA512
c650ae0741c7074561c2b408028aed8e1505257037be6486a249d7b21ff803721c3511088e779463c579da7c17f170d3ea93561a1559afce97464af8bd0b9cd6
-
SSDEEP
768:HPVQOCUM461xGqTpjk6rNj8Nyo4LNCaCqJ6+rLnxe:H+OnMz1IqTpreNyDNJCEM
Static task
static1
Behavioral task
behavioral1
Sample
9b2f54603183b1f465b3d7a28e9f8107d4c57021fa7a91f159f7f24d6137b69d.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
9b2f54603183b1f465b3d7a28e9f8107d4c57021fa7a91f159f7f24d6137b69d.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.smamuhendislik.net - Port:
587 - Username:
[email protected] - Password:
Akarsu24
Extracted
agenttesla
Protocol: smtp- Host:
mail.smamuhendislik.net - Port:
587 - Username:
[email protected] - Password:
Akarsu24 - Email To:
[email protected]
Targets
-
-
Target
9b2f54603183b1f465b3d7a28e9f8107d4c57021fa7a91f159f7f24d6137b69d
-
Size
193KB
-
MD5
42ea0f09f10cd535166fd15e1b85a786
-
SHA1
8a4c03d8bda5cdededadf51862b0317eec702a5f
-
SHA256
9b2f54603183b1f465b3d7a28e9f8107d4c57021fa7a91f159f7f24d6137b69d
-
SHA512
c650ae0741c7074561c2b408028aed8e1505257037be6486a249d7b21ff803721c3511088e779463c579da7c17f170d3ea93561a1559afce97464af8bd0b9cd6
-
SSDEEP
768:HPVQOCUM461xGqTpjk6rNj8Nyo4LNCaCqJ6+rLnxe:H+OnMz1IqTpreNyDNJCEM
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-