General
-
Target
e1ee0a7a8fd5ab718db2a542682db606279d70aff8414a41737d9ed615a64dc0
-
Size
335KB
-
Sample
240312-bl2z4sbf9s
-
MD5
bf5f5c222e7d6bf8c79d073907d780a4
-
SHA1
bb1b4cdf8fce9526e048da6de37072292438f3ad
-
SHA256
e1ee0a7a8fd5ab718db2a542682db606279d70aff8414a41737d9ed615a64dc0
-
SHA512
e73fe89b6e7a6c7046b8e8836b5cd9907b1bf6b7dae5af0847bbafb05e5df1821a3a67228688b54907d12823b9066e5811d716865b19a8a18c32375181c17fc8
-
SSDEEP
3072:h4bOt3ruVu2DqVL9clZwlcCk2w3v0MmGayU+x9:Zt45+Q
Static task
static1
Behavioral task
behavioral1
Sample
e1ee0a7a8fd5ab718db2a542682db606279d70aff8414a41737d9ed615a64dc0.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.tariqinternational.com - Port:
587 - Username:
[email protected] - Password:
taha@2005 - Email To:
[email protected]
Targets
-
-
Target
e1ee0a7a8fd5ab718db2a542682db606279d70aff8414a41737d9ed615a64dc0
-
Size
335KB
-
MD5
bf5f5c222e7d6bf8c79d073907d780a4
-
SHA1
bb1b4cdf8fce9526e048da6de37072292438f3ad
-
SHA256
e1ee0a7a8fd5ab718db2a542682db606279d70aff8414a41737d9ed615a64dc0
-
SHA512
e73fe89b6e7a6c7046b8e8836b5cd9907b1bf6b7dae5af0847bbafb05e5df1821a3a67228688b54907d12823b9066e5811d716865b19a8a18c32375181c17fc8
-
SSDEEP
3072:h4bOt3ruVu2DqVL9clZwlcCk2w3v0MmGayU+x9:Zt45+Q
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Contacts a large (4266) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-