General
-
Target
Docu4000179.tar
-
Size
654KB
-
Sample
231212-aq91vabgek
-
MD5
8840e7f23f488cb9d315c3284c0045e8
-
SHA1
e3f37da391244e2140a4c6236c6ef973068d84df
-
SHA256
161609895630cb16c5cb3065faf62a3bcb50b211a7ef6cc967103072174e5846
-
SHA512
e256281ba9953530c1cce53818b218a2c0738da2d58afa9b0cd25c913331904eabb0575a49f048a483becd9c1f0fe354dcaf6a0587df3436e5f061b4c655d201
-
SSDEEP
12288:ZI/yvwAlXzTsEzs4oPYXVyZF+nZKSPmQ5Ad40ErFdosyYO3KqfVDmlc+eDBhOoLr:ZvPsEzsrAXVyn+EkmQydUFvyYO/xmu+c
Static task
static1
Behavioral task
behavioral1
Sample
Docu4000179.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Docu4000179.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: smtp- Host:
server1.sqsendy.shop - Port:
587 - Username:
[email protected] - Password:
dM=st7.q6yhZ
Extracted
agenttesla
Protocol: smtp- Host:
server1.sqsendy.shop - Port:
587 - Username:
[email protected] - Password:
dM=st7.q6yhZ - Email To:
[email protected]
Targets
-
-
Target
Docu4000179.exe
-
Size
775KB
-
MD5
0b53fa5cecea0dcd84a3c4b1bd46544c
-
SHA1
18174fce423ef109b25b378f73d01a2a4104a8a4
-
SHA256
e0b23d87a5972492b5b4bffa27ff71964b38ff2b9ae1faf971f0bfeb8df11cd8
-
SHA512
2adcf580384bc8daa99ad8b2eb5b8120d0abf3dab4b1c082fbd09a70af4f20ce2103ddfdbbd5293d39e911179906ed7256b0973a36ab83b3d1045461ed034242
-
SSDEEP
12288:QqwwbXXy2Un0q98x+PaoD2zO5eMtIHtmYzkZCyYo/hyBfzj7ELAplrOeC/z3bAdJ:jLypRS+PHO5MsYBZN4fv7EKrD+zLAdJ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-