General
-
Target
8666f07fa7e7240b0f1866c1252cc63f.exe
-
Size
670KB
-
Sample
240124-x4cntsgce6
-
MD5
8666f07fa7e7240b0f1866c1252cc63f
-
SHA1
249b3a687d0e5905b945e58a71b12c34266bf89e
-
SHA256
11db5a95e90d6d4fffdd165db26971e275c9f799302de519a118ad1b48c4f587
-
SHA512
bb96ad7f07dcde34449611e8c8021aea7966e336b097a6ce602517a7411f7da88bd9901e887f52eb4606766f0db785892a669247100a054ed3a214d8b9085f55
-
SSDEEP
12288:mpmi0C0eT+PJW8SCVHdRd0rSDeSYVsMqQk6I+b/R2ZA7pmGEDd:y0a2B4STMqQeLU5c
Static task
static1
Behavioral task
behavioral1
Sample
8666f07fa7e7240b0f1866c1252cc63f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8666f07fa7e7240b0f1866c1252cc63f.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.telefoonreparatiebovenkarspel.nl - Port:
587 - Username:
[email protected] - Password:
Madarjan007!
Extracted
agenttesla
Protocol: smtp- Host:
mail.telefoonreparatiebovenkarspel.nl - Port:
587 - Username:
[email protected] - Password:
Madarjan007! - Email To:
[email protected]
Targets
-
-
Target
8666f07fa7e7240b0f1866c1252cc63f.exe
-
Size
670KB
-
MD5
8666f07fa7e7240b0f1866c1252cc63f
-
SHA1
249b3a687d0e5905b945e58a71b12c34266bf89e
-
SHA256
11db5a95e90d6d4fffdd165db26971e275c9f799302de519a118ad1b48c4f587
-
SHA512
bb96ad7f07dcde34449611e8c8021aea7966e336b097a6ce602517a7411f7da88bd9901e887f52eb4606766f0db785892a669247100a054ed3a214d8b9085f55
-
SSDEEP
12288:mpmi0C0eT+PJW8SCVHdRd0rSDeSYVsMqQk6I+b/R2ZA7pmGEDd:y0a2B4STMqQeLU5c
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-