General
-
Target
ddf715cc498c5415d1537e29b5f9ce5675d23ecda1107fb25d70d517e1385cce
-
Size
430KB
-
Sample
231208-cx2n6aaa8z
-
MD5
ce4d9bc9c425d82622bb341ca1cdf172
-
SHA1
f4f0be627f02567e8724763ae4288875a6716887
-
SHA256
ddf715cc498c5415d1537e29b5f9ce5675d23ecda1107fb25d70d517e1385cce
-
SHA512
c65ae729167902aad9b6e069ddb79cd265e71cd3a7dd7c3e7a281bdd0647855f84a25e823202d5c9ccab47f17a6c286d1fbfdcca9aa069e83c81348f45fc6ba2
-
SSDEEP
6144:16jvs0FpwPBetM3JUlG0vK7Ihj/Tn5aC259Y83wgDeEZ/LnZsKD2FoW3ZpicfaII:16jvs07CeCJ6xCKjjIT/YuwiADZp/t1
Static task
static1
Behavioral task
behavioral1
Sample
ddf715cc498c5415d1537e29b5f9ce5675d23ecda1107fb25d70d517e1385cce.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ddf715cc498c5415d1537e29b5f9ce5675d23ecda1107fb25d70d517e1385cce.exe
Resource
win10v2004-20231201-en
Malware Config
Extracted
Protocol: smtp- Host:
server1.sqsendy.shop - Port:
587 - Username:
[email protected] - Password:
O4{S#5MLFM!Z
Extracted
agenttesla
Protocol: smtp- Host:
server1.sqsendy.shop - Port:
587 - Username:
[email protected] - Password:
O4{S#5MLFM!Z - Email To:
[email protected]
Targets
-
-
Target
ddf715cc498c5415d1537e29b5f9ce5675d23ecda1107fb25d70d517e1385cce
-
Size
430KB
-
MD5
ce4d9bc9c425d82622bb341ca1cdf172
-
SHA1
f4f0be627f02567e8724763ae4288875a6716887
-
SHA256
ddf715cc498c5415d1537e29b5f9ce5675d23ecda1107fb25d70d517e1385cce
-
SHA512
c65ae729167902aad9b6e069ddb79cd265e71cd3a7dd7c3e7a281bdd0647855f84a25e823202d5c9ccab47f17a6c286d1fbfdcca9aa069e83c81348f45fc6ba2
-
SSDEEP
6144:16jvs0FpwPBetM3JUlG0vK7Ihj/Tn5aC259Y83wgDeEZ/LnZsKD2FoW3ZpicfaII:16jvs07CeCJ6xCKjjIT/YuwiADZp/t1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-