General
-
Target
NSS.exe
-
Size
642KB
-
Sample
240312-qvjx8ahh81
-
MD5
876db5122f5ecb90acc915cec4c89810
-
SHA1
4dcedd113292812c0ef832640f3e964eec73c289
-
SHA256
d04380b79524da697074a01b0af3809f881d0fb09a68364083aeb7a1be021249
-
SHA512
f2813727b0f813cad1638d58aedc03caff7c649f4da5af7ef8161c2826e0a5d9526cf30fb19d94e982dae8d66615ef5f735f691d0f23cf1a601bbc87a9eaf2b8
-
SSDEEP
12288:9sJTENl3zT882MF7D9mDSwXhblVpFSgW/MiMJRmDch58dbP1PIPcZpCDzep:+xENlDoMF7DUVRlVfSgEr3DE5eZAw
Static task
static1
Behavioral task
behavioral1
Sample
NSS.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
NSS.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.impressionmotors.in - Port:
587 - Username:
[email protected] - Password:
Kt!@98320Slg - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.impressionmotors.in - Port:
587 - Username:
[email protected] - Password:
Kt!@98320Slg
Targets
-
-
Target
NSS.exe
-
Size
642KB
-
MD5
876db5122f5ecb90acc915cec4c89810
-
SHA1
4dcedd113292812c0ef832640f3e964eec73c289
-
SHA256
d04380b79524da697074a01b0af3809f881d0fb09a68364083aeb7a1be021249
-
SHA512
f2813727b0f813cad1638d58aedc03caff7c649f4da5af7ef8161c2826e0a5d9526cf30fb19d94e982dae8d66615ef5f735f691d0f23cf1a601bbc87a9eaf2b8
-
SSDEEP
12288:9sJTENl3zT882MF7D9mDSwXhblVpFSgW/MiMJRmDch58dbP1PIPcZpCDzep:+xENlDoMF7DUVRlVfSgEr3DE5eZAw
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-