General
-
Target
83248fc14c5704eec0974b7435faf39b83538beeab9ef59a95510243e7fd6e8c
-
Size
238KB
-
Sample
240124-bpenzsehd6
-
MD5
220a2eebd0da4c317d3a2e579f26c739
-
SHA1
17dc62e469e40c211bac88bed2cfa208e947bef3
-
SHA256
83248fc14c5704eec0974b7435faf39b83538beeab9ef59a95510243e7fd6e8c
-
SHA512
072b8af577c48dd383a451f3bccd7b8150a97347382f2e415b3ae8e30e4c233f57f8266ae897369199527069884850d333d8c722a5ca95123178ec898ab3512f
-
SSDEEP
3072:R/9RhCU3anFLqMblcN6bm1RsJ+AI9FP1qymE9/mis1kWm:R1RsU3anFLqMblcNcm1VJ9FwymE9u
Behavioral task
behavioral1
Sample
83248fc14c5704eec0974b7435faf39b83538beeab9ef59a95510243e7fd6e8c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
83248fc14c5704eec0974b7435faf39b83538beeab9ef59a95510243e7fd6e8c.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
euenarji.com - Port:
587 - Username:
[email protected] - Password:
cooldown2013 - Email To:
[email protected]
Targets
-
-
Target
83248fc14c5704eec0974b7435faf39b83538beeab9ef59a95510243e7fd6e8c
-
Size
238KB
-
MD5
220a2eebd0da4c317d3a2e579f26c739
-
SHA1
17dc62e469e40c211bac88bed2cfa208e947bef3
-
SHA256
83248fc14c5704eec0974b7435faf39b83538beeab9ef59a95510243e7fd6e8c
-
SHA512
072b8af577c48dd383a451f3bccd7b8150a97347382f2e415b3ae8e30e4c233f57f8266ae897369199527069884850d333d8c722a5ca95123178ec898ab3512f
-
SSDEEP
3072:R/9RhCU3anFLqMblcN6bm1RsJ+AI9FP1qymE9/mis1kWm:R1RsU3anFLqMblcNcm1VJ9FwymE9u
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-