General
-
Target
3a0dc38c08345f32eb6a71f4a18d5728.bin
-
Size
616KB
-
Sample
231224-byvrkacfaj
-
MD5
c4c52029f904715a507159b1eb3ab10b
-
SHA1
471329e50e5e5b8fa563a01f90b62a42003a478a
-
SHA256
a1dd4b4d9470bfd1d2140d0d684103863ecee9e00d78ba0cc265857d4502a54b
-
SHA512
ba1c5230d5fb8464951df857b6277f437b43c8e9a8050568e1a7e07123a8c95040dc75a593b44693ad4b065ac62a7d2a5d831ed46364186eb9d1183fb55a7202
-
SSDEEP
12288:ius67cmLOODrUK2nD0r0xE2zZ6bGrG9gYOO0uoMhXJlkhmmvle3Oc8l2+bV+BmTU:VomLOmrUrM6EmsbGrG9g7Vuz1mte3Ocj
Static task
static1
Behavioral task
behavioral1
Sample
dcfd5b0c16f4b58c12f71af5f546b06fbdf597b7a82d6c14b9799588551a5a9a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
dcfd5b0c16f4b58c12f71af5f546b06fbdf597b7a82d6c14b9799588551a5a9a.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aranybarany.hu - Port:
587 - Username:
[email protected] - Password:
18Szalloda94 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.aranybarany.hu - Port:
587 - Username:
[email protected] - Password:
18Szalloda94
Targets
-
-
Target
dcfd5b0c16f4b58c12f71af5f546b06fbdf597b7a82d6c14b9799588551a5a9a.exe
-
Size
692KB
-
MD5
3a0dc38c08345f32eb6a71f4a18d5728
-
SHA1
b3333d60a27d50152b8f5604834944df9db9892f
-
SHA256
dcfd5b0c16f4b58c12f71af5f546b06fbdf597b7a82d6c14b9799588551a5a9a
-
SHA512
637a89de84ab665ea1426360012ea870eb6dfb3051297105167a915969186b472a550570267ce4b041538d330bcf29b935ece8f1f9b6560e87dc5939449e8ec5
-
SSDEEP
12288:ZZSySOmnomWOHSXjcS/tMjV6KbFpLw8Kn/R9JN0EwNCyzsdppHSKW:Hzmo/BXg2Mp6KbbLon/R9X0EkCyU
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-