General
-
Target
2004-6-0x00000000004C0000-0x0000000000502000-memory.dmp
-
Size
264KB
-
Sample
240124-bynm9afabk
-
MD5
77f830cd19dc0ca7b339fdb6a2c11f9c
-
SHA1
954020e45fa419a4ac3cf8143ad9d3e3aec6344d
-
SHA256
8e02524d2aab1a9470b4365642cb95b8bd8b3697f0c2750aaa66a65560dc89e2
-
SHA512
bcdeec9b8c53bb01dda9c89aae3706bf830cf16c4130e1d29e7f3f82649c84c7df1cec07b03ed221c4183d51436fc04f21aeaf0663683fd1a942bd65982945a7
-
SSDEEP
3072:EOG8UksMDVr4PfnftAkRvDdm0AnzDwuTX5g65zUu+PQ:Eb8UksMRr4PfnakRvDd9uTR5QuR
Behavioral task
behavioral1
Sample
2004-6-0x00000000004C0000-0x0000000000502000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2004-6-0x00000000004C0000-0x0000000000502000-memory.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
svnh oeyt maai vbsz
Targets
-
-
Target
2004-6-0x00000000004C0000-0x0000000000502000-memory.dmp
-
Size
264KB
-
MD5
77f830cd19dc0ca7b339fdb6a2c11f9c
-
SHA1
954020e45fa419a4ac3cf8143ad9d3e3aec6344d
-
SHA256
8e02524d2aab1a9470b4365642cb95b8bd8b3697f0c2750aaa66a65560dc89e2
-
SHA512
bcdeec9b8c53bb01dda9c89aae3706bf830cf16c4130e1d29e7f3f82649c84c7df1cec07b03ed221c4183d51436fc04f21aeaf0663683fd1a942bd65982945a7
-
SSDEEP
3072:EOG8UksMDVr4PfnftAkRvDdm0AnzDwuTX5g65zUu+PQ:Eb8UksMRr4PfnakRvDd9uTR5QuR
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-