General
-
Target
b9173178b6035df070e0477d515bb5e1eb7e6b5416a9a19d6ef41418790fbfbe
-
Size
740KB
-
Sample
240204-bjcmfagchr
-
MD5
f0a3cbf3aa3627bf4de6298a5da8a42a
-
SHA1
3ed87fb9e33995ad1ef9d325804c587bfe9950f1
-
SHA256
b9173178b6035df070e0477d515bb5e1eb7e6b5416a9a19d6ef41418790fbfbe
-
SHA512
6fbb2e3336a13301b081b39bf5b025672368902a02b55d95f3b5ef22a2c240efffb79db4af0acf6a9e655f1f4a4157c86b62a91540b1e9e8f2c1770c359dcc85
-
SSDEEP
12288:y/36c8j8qshD3RiIJFf9zBdW0NK9mld0WHI5U+nugc/P1GaEcFRt02n:y/36c8bsh7HJFfrdW0NK9mkmkugQ17
Static task
static1
Behavioral task
behavioral1
Sample
b9173178b6035df070e0477d515bb5e1eb7e6b5416a9a19d6ef41418790fbfbe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b9173178b6035df070e0477d515bb5e1eb7e6b5416a9a19d6ef41418790fbfbe.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.superlink.ae - Port:
587 - Username:
[email protected] - Password:
Babyko14
Extracted
agenttesla
Protocol: smtp- Host:
mail.superlink.ae - Port:
587 - Username:
[email protected] - Password:
Babyko14 - Email To:
[email protected]
Targets
-
-
Target
b9173178b6035df070e0477d515bb5e1eb7e6b5416a9a19d6ef41418790fbfbe
-
Size
740KB
-
MD5
f0a3cbf3aa3627bf4de6298a5da8a42a
-
SHA1
3ed87fb9e33995ad1ef9d325804c587bfe9950f1
-
SHA256
b9173178b6035df070e0477d515bb5e1eb7e6b5416a9a19d6ef41418790fbfbe
-
SHA512
6fbb2e3336a13301b081b39bf5b025672368902a02b55d95f3b5ef22a2c240efffb79db4af0acf6a9e655f1f4a4157c86b62a91540b1e9e8f2c1770c359dcc85
-
SSDEEP
12288:y/36c8j8qshD3RiIJFf9zBdW0NK9mld0WHI5U+nugc/P1GaEcFRt02n:y/36c8bsh7HJFfrdW0NK9mkmkugQ17
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-