General
-
Target
83c0f4886beef85f2c2c9d97a4491330e6c3f9ed7a5b088965fe5eb367cbf8b2
-
Size
1011KB
-
Sample
240308-bsgbzscd3y
-
MD5
cf1cccbdf2580bc20a5d6c7a8e2f047d
-
SHA1
2e5cce88fe062e33993daa5cd23856aae93ba7bf
-
SHA256
83c0f4886beef85f2c2c9d97a4491330e6c3f9ed7a5b088965fe5eb367cbf8b2
-
SHA512
e2ce8fd1f1747faa596b18923e41740d32ca96e91e759822bd4050c3222b8f872836120843ade96192ee3efb9f5d18bef7f9a4f7e89800815da22ccf01fe98f3
-
SSDEEP
24576:mB+ghm5v+KjVvuniHXR4ufQ/rEPNKLmaYEPrZaMR8bR:o+r5unE4tTE1ZaYXM
Static task
static1
Behavioral task
behavioral1
Sample
83c0f4886beef85f2c2c9d97a4491330e6c3f9ed7a5b088965fe5eb367cbf8b2.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
VvMMgD#w!TZmaka!@ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
VvMMgD#w!TZmaka!@
Targets
-
-
Target
83c0f4886beef85f2c2c9d97a4491330e6c3f9ed7a5b088965fe5eb367cbf8b2
-
Size
1011KB
-
MD5
cf1cccbdf2580bc20a5d6c7a8e2f047d
-
SHA1
2e5cce88fe062e33993daa5cd23856aae93ba7bf
-
SHA256
83c0f4886beef85f2c2c9d97a4491330e6c3f9ed7a5b088965fe5eb367cbf8b2
-
SHA512
e2ce8fd1f1747faa596b18923e41740d32ca96e91e759822bd4050c3222b8f872836120843ade96192ee3efb9f5d18bef7f9a4f7e89800815da22ccf01fe98f3
-
SSDEEP
24576:mB+ghm5v+KjVvuniHXR4ufQ/rEPNKLmaYEPrZaMR8bR:o+r5unE4tTE1ZaYXM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-