General
-
Target
plugmanxz.exe
-
Size
737KB
-
Sample
231209-wmftgsbdd3
-
MD5
a0a98d41a45aaa6af1ad3d084218e1b7
-
SHA1
aaf63c99c9313bd7ee46b67f5bea4f35e967e1af
-
SHA256
e3c48ba70cb42a88e5ebe7e22a5c28ddf8993f9c5106d0ab7e38450229f374c6
-
SHA512
96542a1828b66845095f98fb62fb99975a507a89bcc487139045800c5bc1a05bedc337e3699a06887969319b6f8fb51e568d13e42c12815d6d0092b71367e495
-
SSDEEP
12288:qqc3+GCueH5qtq485C4yKsh8v7TxLnnpxm2WZfQ0l9CLVzev:q/uG2qg4R8v7TxLpwHt/Qg
Static task
static1
Behavioral task
behavioral1
Sample
plugmanxz.exe
Resource
win7-20231023-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
YAWALESS123@@kkk - Email To:
[email protected]
Targets
-
-
Target
plugmanxz.exe
-
Size
737KB
-
MD5
a0a98d41a45aaa6af1ad3d084218e1b7
-
SHA1
aaf63c99c9313bd7ee46b67f5bea4f35e967e1af
-
SHA256
e3c48ba70cb42a88e5ebe7e22a5c28ddf8993f9c5106d0ab7e38450229f374c6
-
SHA512
96542a1828b66845095f98fb62fb99975a507a89bcc487139045800c5bc1a05bedc337e3699a06887969319b6f8fb51e568d13e42c12815d6d0092b71367e495
-
SSDEEP
12288:qqc3+GCueH5qtq485C4yKsh8v7TxLnnpxm2WZfQ0l9CLVzev:q/uG2qg4R8v7TxLpwHt/Qg
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-