General
-
Target
E0C73CB7E1CBA075A682E8D09EEBC505B0F0B955073277476D5B4BA4475DDD68
-
Size
608KB
-
Sample
240127-z7g4tsebep
-
MD5
acb9acd11b1e962085645cf47712c1b1
-
SHA1
40b131de9ff22b17119304df72403f9f1e19a424
-
SHA256
e0c73cb7e1cba075a682e8d09eebc505b0f0b955073277476d5b4ba4475ddd68
-
SHA512
0247185787db49477a7f0d14863032d009229c25f41d488438ea83a70bf056c83481ed14b52134fb848c41664c3d744be3e7d53df561a0991c31e9215ae4ef3a
-
SSDEEP
12288:WwNjSfjY4jEiMs7oLGJKsNza2TDVcqM74z1JwZVsxvXW+DRJCrg:WwNjS8mMco2KyW2ifGJwZmmKLCU
Static task
static1
Behavioral task
behavioral1
Sample
AWB 8025872328 - COPY.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
AWB 8025872328 - COPY.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.awandigroup.com - Port:
587 - Username:
[email protected] - Password:
kensarowiwa888 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.awandigroup.com - Port:
587 - Username:
[email protected] - Password:
kensarowiwa888
Targets
-
-
Target
AWB 8025872328 - COPY.exe
-
Size
637KB
-
MD5
b214c63bf67da028c25998f2e253d256
-
SHA1
96c29cf222fd71d55883c91199ca9832b8f367e7
-
SHA256
088de3ff3b208de2ced330d823c66beb8e1e3c6ac42c06f4bba24768ba0731f4
-
SHA512
6ace455f923698f7c2ca19ec734cf8ed64df097a7602262f607d21044cb7c28ca29d8eb77dd7c913765b4d0cc4afa303550aad2a6b15061000ccb5e36fbe5a7d
-
SSDEEP
12288:9oNuPUvv70BGKgHha+DQezgT367+z1VwZXsxvXWoDRJq3cDFTk:mYE0BGKgxDQkgeEVwZEmULXD
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-