General
-
Target
08018c4ffcb5b25d3bedc1fddadf713e.bin
-
Size
682KB
-
Sample
240118-bc5pmsadc2
-
MD5
5b63687c80fb7ab467a808937e0c3bac
-
SHA1
08545d7f26e7d6a0fafd442362802beefea4dac1
-
SHA256
00dca5c846aac5002f6f6936499acea6c1b1a6f559385c1b4baf65d8119d29ba
-
SHA512
cd260cdffeadc60a6679a290ea18ff401e3b92a9a2828990348fa4d3a8a52da96144c922387f01a418c0842392b2a322a288960cde4b38e809f9bcb30aedd974
-
SSDEEP
12288:RyYl8D8jJzcWX7en0Ya0fkrXKt/J0oaPVoao9aN7oi6DZarFvstv/I5P3me4+2E6:RyYl8I9zvXKn0pykLKAhPnoc6i6NapvQ
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.exe
Resource
win7-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pharmacell.com.tr - Port:
587 - Username:
[email protected] - Password:
Fatih-2015a - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.pharmacell.com.tr - Port:
587 - Username:
[email protected] - Password:
Fatih-2015a
Targets
-
-
Target
hesaphareketi-01.exe
-
Size
851KB
-
MD5
de310f037110ce251ad1c23f09318c29
-
SHA1
46310a5a3997575f8b4df66ebda2707061f517aa
-
SHA256
237a9a1345466333a1dd02477c5a1f9fe1ce0078f869e397db00ac84516060e2
-
SHA512
16e845a708f2d219b17beb9a25dbe3fe198bcfad87205bbfd3da0b13cc0a607ffd3330533f8caff176d336c90437adfc2ec3addfa35f6322357a5aa701f26e96
-
SSDEEP
24576:cbGLYrmqV26Q+/DLXW/rIeH4OxLNILj+:yGLYrPV24XWjIcwL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-