General
-
Target
9a95770cc4686d6d14f68d10a33f15c82118673fb08232aa0c7b0c1c6783a4fc
-
Size
559KB
-
Sample
240228-bedc6sfe38
-
MD5
2ce65ae1f22fca86cf769233ff101ec1
-
SHA1
1414e05776ba1b9a4420b4aea25e2ec7dc77657d
-
SHA256
9a95770cc4686d6d14f68d10a33f15c82118673fb08232aa0c7b0c1c6783a4fc
-
SHA512
08e23b7ca5c032995900a87bde81fb0e5d40141d9623056eac87c0778606a9078f6d140aca5b65ad3689eac5ff9fb0503f5ec7692ee57629313a5531ea905230
-
SSDEEP
12288:1m60pEHTdQcJpI/esvCX6thsPg4dg2XeLT16L0XWgSTr:1z0C5pIWYCqthR4dg8m6LRgST
Static task
static1
Behavioral task
behavioral1
Sample
9a95770cc4686d6d14f68d10a33f15c82118673fb08232aa0c7b0c1c6783a4fc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a95770cc4686d6d14f68d10a33f15c82118673fb08232aa0c7b0c1c6783a4fc.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
webmail.unwired.com.fj - Port:
587 - Username:
[email protected] - Password:
S@ndy123
Extracted
agenttesla
Protocol: smtp- Host:
webmail.unwired.com.fj - Port:
587 - Username:
[email protected] - Password:
S@ndy123 - Email To:
[email protected]
Targets
-
-
Target
9a95770cc4686d6d14f68d10a33f15c82118673fb08232aa0c7b0c1c6783a4fc
-
Size
559KB
-
MD5
2ce65ae1f22fca86cf769233ff101ec1
-
SHA1
1414e05776ba1b9a4420b4aea25e2ec7dc77657d
-
SHA256
9a95770cc4686d6d14f68d10a33f15c82118673fb08232aa0c7b0c1c6783a4fc
-
SHA512
08e23b7ca5c032995900a87bde81fb0e5d40141d9623056eac87c0778606a9078f6d140aca5b65ad3689eac5ff9fb0503f5ec7692ee57629313a5531ea905230
-
SSDEEP
12288:1m60pEHTdQcJpI/esvCX6thsPg4dg2XeLT16L0XWgSTr:1z0C5pIWYCqthR4dg8m6LRgST
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-