General
-
Target
125a0c5ed0934067110aaaf3b728d2509a12aefa9b820b8964ba303396e3c7b4
-
Size
614KB
-
Sample
231212-bt9d6acehl
-
MD5
872cb6f0e8451a60e514851cdd2aa3d3
-
SHA1
ce73360c76ba965ec74704e97d169eaf2cb5afc5
-
SHA256
125a0c5ed0934067110aaaf3b728d2509a12aefa9b820b8964ba303396e3c7b4
-
SHA512
b8a772a531e61eb3444bc0f2ae5c8037acba781b4319b5c2e1760d1267bf279d1572c3917c51127b172a033b5b43efa9f6dd86039a877c56c5077c6fdb8e42be
-
SSDEEP
12288:43IU8S6eUd7rHtoZIaDOnAWPYJV84yGRU8h4NYCYETsF1h:WItSAd7rHWZIaqAWuU8mN1YRFL
Static task
static1
Behavioral task
behavioral1
Sample
125a0c5ed0934067110aaaf3b728d2509a12aefa9b820b8964ba303396e3c7b4.exe
Resource
win7-20231201-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.acestar.com.ph - Port:
587 - Username:
[email protected] - Password:
cssubic@12345 - Email To:
[email protected]
Targets
-
-
Target
125a0c5ed0934067110aaaf3b728d2509a12aefa9b820b8964ba303396e3c7b4
-
Size
614KB
-
MD5
872cb6f0e8451a60e514851cdd2aa3d3
-
SHA1
ce73360c76ba965ec74704e97d169eaf2cb5afc5
-
SHA256
125a0c5ed0934067110aaaf3b728d2509a12aefa9b820b8964ba303396e3c7b4
-
SHA512
b8a772a531e61eb3444bc0f2ae5c8037acba781b4319b5c2e1760d1267bf279d1572c3917c51127b172a033b5b43efa9f6dd86039a877c56c5077c6fdb8e42be
-
SSDEEP
12288:43IU8S6eUd7rHtoZIaDOnAWPYJV84yGRU8h4NYCYETsF1h:WItSAd7rHWZIaqAWuU8mN1YRFL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-