General
-
Target
34d4f41be41415d251e917eec848e3a0e93a741ef5ac3d17e2781597c6d947a9
-
Size
69KB
-
Sample
240316-bqgjzagd6z
-
MD5
e567a41dabaf821c0bc51aff2925c190
-
SHA1
761fe57c2da0aa95562369e67370748239e390db
-
SHA256
34d4f41be41415d251e917eec848e3a0e93a741ef5ac3d17e2781597c6d947a9
-
SHA512
a6e43a2f22ccb5c70f5974193d0d0091f6b89a322002c37ce386ef8f2231ac0f58edd2bcb6cdde15f10387e26abcb09da2481b384ec9a408e700d2a8e611526e
-
SSDEEP
1536:6TtLyGyu01akkh9wTt+XqVlknkkqdiuuYzsaOYC97jSVL6V:6tHwB+XqVlknkkqdiuuYzsaOr7jaLQ
Static task
static1
Behavioral task
behavioral1
Sample
34d4f41be41415d251e917eec848e3a0e93a741ef5ac3d17e2781597c6d947a9.rtf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34d4f41be41415d251e917eec848e3a0e93a741ef5ac3d17e2781597c6d947a9.rtf
Resource
win10v2004-20231215-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.mez.com.tr - Port:
587 - Username:
[email protected] - Password:
Ey25tK
Extracted
agenttesla
Protocol: smtp- Host:
mail.mez.com.tr - Port:
587 - Username:
[email protected] - Password:
Ey25tK - Email To:
[email protected]
Targets
-
-
Target
34d4f41be41415d251e917eec848e3a0e93a741ef5ac3d17e2781597c6d947a9
-
Size
69KB
-
MD5
e567a41dabaf821c0bc51aff2925c190
-
SHA1
761fe57c2da0aa95562369e67370748239e390db
-
SHA256
34d4f41be41415d251e917eec848e3a0e93a741ef5ac3d17e2781597c6d947a9
-
SHA512
a6e43a2f22ccb5c70f5974193d0d0091f6b89a322002c37ce386ef8f2231ac0f58edd2bcb6cdde15f10387e26abcb09da2481b384ec9a408e700d2a8e611526e
-
SSDEEP
1536:6TtLyGyu01akkh9wTt+XqVlknkkqdiuuYzsaOYC97jSVL6V:6tHwB+XqVlknkkqdiuuYzsaOr7jaLQ
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-