General
-
Target
104398948d38b5b4edcf8f84d941a9e171df7208cf81e80195ee64c91801cc26
-
Size
709KB
-
Sample
240307-b8xnxaea61
-
MD5
3ed561debb7b5503e23a931208091f08
-
SHA1
b1531e0d5486742702d16dcf553eea875e2d9a4c
-
SHA256
104398948d38b5b4edcf8f84d941a9e171df7208cf81e80195ee64c91801cc26
-
SHA512
18983e5e1bf0bf73cb9f59decf4c3028b4d1147eb26143a18cd28996856767a5d229ed50ff10dcba853c94899c05ddab481ce6767f34b3ce8574d391138038e4
-
SSDEEP
12288:tBtuk7/jvPsv5iHI0GJKIUi942GQFAsvJGouGARLUlumb2lCcp7jizCDstRd:sc/jvP6wHIn4WFtIopARyb2kc7ji+sf
Static task
static1
Behavioral task
behavioral1
Sample
104398948d38b5b4edcf8f84d941a9e171df7208cf81e80195ee64c91801cc26.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
104398948d38b5b4edcf8f84d941a9e171df7208cf81e80195ee64c91801cc26.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
pro51.emailserver.vn - Port:
587 - Username:
[email protected] - Password:
O{AG(tbFk2.Y - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
pro51.emailserver.vn - Port:
587 - Username:
[email protected] - Password:
O{AG(tbFk2.Y
Targets
-
-
Target
104398948d38b5b4edcf8f84d941a9e171df7208cf81e80195ee64c91801cc26
-
Size
709KB
-
MD5
3ed561debb7b5503e23a931208091f08
-
SHA1
b1531e0d5486742702d16dcf553eea875e2d9a4c
-
SHA256
104398948d38b5b4edcf8f84d941a9e171df7208cf81e80195ee64c91801cc26
-
SHA512
18983e5e1bf0bf73cb9f59decf4c3028b4d1147eb26143a18cd28996856767a5d229ed50ff10dcba853c94899c05ddab481ce6767f34b3ce8574d391138038e4
-
SSDEEP
12288:tBtuk7/jvPsv5iHI0GJKIUi942GQFAsvJGouGARLUlumb2lCcp7jizCDstRd:sc/jvP6wHIn4WFtIopARyb2kc7ji+sf
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-