General
-
Target
8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976
-
Size
587KB
-
Sample
231211-b9jtfabbb7
-
MD5
ce62a9d0c996178c2ac6a7b9a652257e
-
SHA1
a8b4df6d25572780e70d10f64a5f7cda95180bd4
-
SHA256
8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976
-
SHA512
a9cebf2750e1da9cae45825212c2189fe25cb6194c0b2ca564185f44514ba71f01adc9e6181acd56c8b355e2ebe6f0d34a133fed9e7af1b8f7fa3ba88a8d0520
-
SSDEEP
12288:KxPgUrz/QxsOiVSXGNmMyR+llVu07GOjmnmvHV:qh4ZiVS2NmIuO4mvV
Static task
static1
Behavioral task
behavioral1
Sample
8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: smtp- Host:
premium185.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
cooldown2013
Targets
-
-
Target
8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976
-
Size
587KB
-
MD5
ce62a9d0c996178c2ac6a7b9a652257e
-
SHA1
a8b4df6d25572780e70d10f64a5f7cda95180bd4
-
SHA256
8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976
-
SHA512
a9cebf2750e1da9cae45825212c2189fe25cb6194c0b2ca564185f44514ba71f01adc9e6181acd56c8b355e2ebe6f0d34a133fed9e7af1b8f7fa3ba88a8d0520
-
SSDEEP
12288:KxPgUrz/QxsOiVSXGNmMyR+llVu07GOjmnmvHV:qh4ZiVS2NmIuO4mvV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-