General
-
Target
SecuriteInfo.com.Win32.DropperX-gen.18290.17643
-
Size
149KB
-
Sample
240123-rs5btabbdj
-
MD5
c8f0a0467f93a78e0fbbafe91d60be91
-
SHA1
e98b43e8c0cf076ba250f764885fbffc9e5fcaf6
-
SHA256
9749e1e9a73aa3bad510d2bde35e011e00283aa46443ad86ade820b560ade944
-
SHA512
cb86f8c76f45af544845ab1b9186e48cb8fe8a14b4f75f1e56bfdb570c9f873f90baa16648d614e0d45c54022a04ca2e6cffed9d3aa6866807f977e524efc232
-
SSDEEP
3072:Qecoqbo81ZvFe3sf8Y1DXylHyoWmbdyFQgrqyYTXrDD6vVT:Qectz1ZvFe3sf1XylSioFgTjq
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.DropperX-gen.18290.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.DropperX-gen.18290.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server1.coleoffice.shop - Port:
587 - Username:
[email protected] - Password:
ABM!-_@9BG@_ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
server1.coleoffice.shop - Port:
587 - Username:
[email protected] - Password:
ABM!-_@9BG@_
Targets
-
-
Target
SecuriteInfo.com.Win32.DropperX-gen.18290.17643
-
Size
149KB
-
MD5
c8f0a0467f93a78e0fbbafe91d60be91
-
SHA1
e98b43e8c0cf076ba250f764885fbffc9e5fcaf6
-
SHA256
9749e1e9a73aa3bad510d2bde35e011e00283aa46443ad86ade820b560ade944
-
SHA512
cb86f8c76f45af544845ab1b9186e48cb8fe8a14b4f75f1e56bfdb570c9f873f90baa16648d614e0d45c54022a04ca2e6cffed9d3aa6866807f977e524efc232
-
SSDEEP
3072:Qecoqbo81ZvFe3sf8Y1DXylHyoWmbdyFQgrqyYTXrDD6vVT:Qectz1ZvFe3sf1XylSioFgTjq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-