General
-
Target
ab38891963c65c3ceb20c156563adf234b3fe26116dc2496e10f463b74df27e9.exe
-
Size
107KB
-
Sample
240213-e8m19aaf5t
-
MD5
f873b2aae040d6d8f50e493cd5602577
-
SHA1
f88854aa5d57cee0b555a2c730f9222f01feacd2
-
SHA256
ab38891963c65c3ceb20c156563adf234b3fe26116dc2496e10f463b74df27e9
-
SHA512
5b8446266bee34f241b8b3211146ea95651b449ea8c57c0fd65f3c1a6a7d7b7534131b34cf86bd191e7acc2b68269685749120eb7a087bbf73246e9df346cd32
-
SSDEEP
3072:Pw5ApHMbC/b14+Olf22thZjFxQny9KfzV:POUHMyf
Static task
static1
Behavioral task
behavioral1
Sample
ab38891963c65c3ceb20c156563adf234b3fe26116dc2496e10f463b74df27e9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ab38891963c65c3ceb20c156563adf234b3fe26116dc2496e10f463b74df27e9.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.myejen2u.com - Port:
587 - Username:
[email protected] - Password:
BH2CL(;rQ=)(
Extracted
agenttesla
Protocol: smtp- Host:
mail.myejen2u.com - Port:
587 - Username:
[email protected] - Password:
BH2CL(;rQ=)( - Email To:
[email protected]
Targets
-
-
Target
ab38891963c65c3ceb20c156563adf234b3fe26116dc2496e10f463b74df27e9.exe
-
Size
107KB
-
MD5
f873b2aae040d6d8f50e493cd5602577
-
SHA1
f88854aa5d57cee0b555a2c730f9222f01feacd2
-
SHA256
ab38891963c65c3ceb20c156563adf234b3fe26116dc2496e10f463b74df27e9
-
SHA512
5b8446266bee34f241b8b3211146ea95651b449ea8c57c0fd65f3c1a6a7d7b7534131b34cf86bd191e7acc2b68269685749120eb7a087bbf73246e9df346cd32
-
SSDEEP
3072:Pw5ApHMbC/b14+Olf22thZjFxQny9KfzV:POUHMyf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-