General
-
Target
1cc4b5233db6920249554ab7710cff8b.bin
-
Size
222KB
-
Sample
240110-bhqgxaahgn
-
MD5
3f5bc0d562a603f6db13a4e6bc2255ff
-
SHA1
106c6a5b78aa709327ada9ec3197f79bff1b6dba
-
SHA256
14c05a8dce914f2e8e6dc5125f049a32b9377aa12eb8a82dae4434a7f840f28a
-
SHA512
fc8287c42890b4e057e91dcd42c43613b6b5062ce343306ac2785deb31b67ea32566dedfbf0a36fbc37fcaac1f217aeb5c420a69b4f7cfbb37b41b188652c8a6
-
SSDEEP
6144:QGL+ZHZ57zCXpWYzBR+P+Hdo+UQftMVNA7d2tWqE:TqP7zUWGR+4dTUvVEWZE
Static task
static1
Behavioral task
behavioral1
Sample
Zamówienie. CONSTAB PR 00701 LD_pdf .exe
Resource
win7-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mailbuilderbuilder.com - Port:
587 - Username:
[email protected] - Password:
Alluminio.1 - Email To:
[email protected]
Targets
-
-
Target
Zamówienie. CONSTAB PR 00701 LD_pdf .exe
-
Size
445KB
-
MD5
01035dfa446d409d0d29031976542b11
-
SHA1
6fe70938bd3cb9e18531df4ee812751f4e7fbc7f
-
SHA256
c45444742c9f216bfe87e46a23c2f47e633a815b97b65f4d809331f8a6da396f
-
SHA512
334d7b7028e0fd82f1936c9489c99ace5055167e44654cd902d001af44c28195bf4b7031e67a83e89f055008ea97a95dcb7a27045834f85e0a8ce04a2670f864
-
SSDEEP
6144:fRIeIzL0Iygqms9zMifVAJI8j5mepjJ700gtTbS7i2XThZwfQq:JTIyxjpEhIe/00gti7i2XThZfq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-