General
-
Target
91975dd11dbcf2cebd2f381722eaded7f39a3a472a1bbba8ea8aeb6d17dd5ea8
-
Size
52.0MB
-
Sample
231209-bk1ewsfdh6
-
MD5
50ca49db35da90d69b4a855f7595c480
-
SHA1
cc7cb6b3b7d3f95f032b092a9c994cd01aa2d374
-
SHA256
91975dd11dbcf2cebd2f381722eaded7f39a3a472a1bbba8ea8aeb6d17dd5ea8
-
SHA512
de8253b181ef74136574c2286fe26ec082053247f523fba2f72a4b91d0c24d712cb13bebf77ba4f24843fa039db6920c788cc93bb2ae6d23b277b33576c17b38
-
SSDEEP
12288:mW6tW1aXobBRh1bFycNjp7WOXDlXYBEkYSNn3ed/E:w4bbTCYDlXIjYSNj
Static task
static1
Behavioral task
behavioral1
Sample
91975dd11dbcf2cebd2f381722eaded7f39a3a472a1bbba8ea8aeb6d17dd5ea8.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
91975dd11dbcf2cebd2f381722eaded7f39a3a472a1bbba8ea8aeb6d17dd5ea8.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.flecon.com.sg - Port:
587 - Username:
[email protected] - Password:
8CJN6A87XUIU - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.flecon.com.sg - Port:
587 - Username:
[email protected] - Password:
8CJN6A87XUIU
Targets
-
-
Target
91975dd11dbcf2cebd2f381722eaded7f39a3a472a1bbba8ea8aeb6d17dd5ea8
-
Size
52.0MB
-
MD5
50ca49db35da90d69b4a855f7595c480
-
SHA1
cc7cb6b3b7d3f95f032b092a9c994cd01aa2d374
-
SHA256
91975dd11dbcf2cebd2f381722eaded7f39a3a472a1bbba8ea8aeb6d17dd5ea8
-
SHA512
de8253b181ef74136574c2286fe26ec082053247f523fba2f72a4b91d0c24d712cb13bebf77ba4f24843fa039db6920c788cc93bb2ae6d23b277b33576c17b38
-
SSDEEP
12288:mW6tW1aXobBRh1bFycNjp7WOXDlXYBEkYSNn3ed/E:w4bbTCYDlXIjYSNj
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-