General
-
Target
1a8751c20a763aba2b5a046623a1f7d8.bin
-
Size
7.3MB
-
Sample
240119-bgvegaccgl
-
MD5
1a8751c20a763aba2b5a046623a1f7d8
-
SHA1
9099c89e0cbc3176c83df3fc5a7ca9335f175e71
-
SHA256
1ea514d4afd80ba9d580c76fb0edf0f6b06bcddc465a8a9f6a7ae6a1daecb5d8
-
SHA512
bdcc1b6a6fb2349bbaa175f4ed87ceccd779ce346388ccf91d9c732683abc0adff03c9025868d8436addf375d0c0211fda87a8fb7ce2b97db7ec3446d5ee0a1e
-
SSDEEP
98304:2FRAZVUiZ9g3dTk7PMIiszVNdACmpCw0:HZWtgPj9PdACmp
Static task
static1
Behavioral task
behavioral1
Sample
1a8751c20a763aba2b5a046623a1f7d8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a8751c20a763aba2b5a046623a1f7d8.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.semashipping.com - Port:
587 - Username:
[email protected] - Password:
mBNcyT$Ahz5P - Email To:
[email protected]
Targets
-
-
Target
1a8751c20a763aba2b5a046623a1f7d8.bin
-
Size
7.3MB
-
MD5
1a8751c20a763aba2b5a046623a1f7d8
-
SHA1
9099c89e0cbc3176c83df3fc5a7ca9335f175e71
-
SHA256
1ea514d4afd80ba9d580c76fb0edf0f6b06bcddc465a8a9f6a7ae6a1daecb5d8
-
SHA512
bdcc1b6a6fb2349bbaa175f4ed87ceccd779ce346388ccf91d9c732683abc0adff03c9025868d8436addf375d0c0211fda87a8fb7ce2b97db7ec3446d5ee0a1e
-
SSDEEP
98304:2FRAZVUiZ9g3dTk7PMIiszVNdACmpCw0:HZWtgPj9PdACmp
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-