General
-
Target
d82b131f63b7421b9de90ad8ac7a793d369996f1e16abcda35513fd06ca8d300
-
Size
193KB
-
Sample
231208-ctvrfagf99
-
MD5
b69f2cdbf28652571e762f9aac158b50
-
SHA1
2d10897a4446c1f64d5859140a83d516b3ffc358
-
SHA256
d82b131f63b7421b9de90ad8ac7a793d369996f1e16abcda35513fd06ca8d300
-
SHA512
d4e5f9baaed7a2b151d6e10c79de959d0a322d21e62e3a556fc9c5f0e763a4ef92e9e0c604108c9349af4ce80408890b547c82a95710b768e3169279477dbaac
-
SSDEEP
768:npOCUM461xGqTpjk6rNj8Nyo4LNCaCqJ6+rLnx+:pOnMz1IqTpreNyDNJCE8
Static task
static1
Behavioral task
behavioral1
Sample
d82b131f63b7421b9de90ad8ac7a793d369996f1e16abcda35513fd06ca8d300.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
d82b131f63b7421b9de90ad8ac7a793d369996f1e16abcda35513fd06ca8d300.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: smtp- Host:
meka.ldc.lv - Port:
587 - Username:
[email protected] - Password:
DJj8Mza7MM
Extracted
agenttesla
Protocol: smtp- Host:
meka.ldc.lv - Port:
587 - Username:
[email protected] - Password:
DJj8Mza7MM - Email To:
[email protected]
Targets
-
-
Target
d82b131f63b7421b9de90ad8ac7a793d369996f1e16abcda35513fd06ca8d300
-
Size
193KB
-
MD5
b69f2cdbf28652571e762f9aac158b50
-
SHA1
2d10897a4446c1f64d5859140a83d516b3ffc358
-
SHA256
d82b131f63b7421b9de90ad8ac7a793d369996f1e16abcda35513fd06ca8d300
-
SHA512
d4e5f9baaed7a2b151d6e10c79de959d0a322d21e62e3a556fc9c5f0e763a4ef92e9e0c604108c9349af4ce80408890b547c82a95710b768e3169279477dbaac
-
SSDEEP
768:npOCUM461xGqTpjk6rNj8Nyo4LNCaCqJ6+rLnx+:pOnMz1IqTpreNyDNJCE8
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-