General
-
Target
remittance copy $58,670.00.exe
-
Size
608KB
-
Sample
240319-jsj2waeb43
-
MD5
dd7ac5f2109c2cc61763ae93e4fb955c
-
SHA1
558e89789946fb4cfc3b63bc258ddfe23d42c558
-
SHA256
84b2a0360556088e4aad29627d4ed15d53b18aa72d9d98b4b0d1be27916c681e
-
SHA512
783124beae908538c6e19a710669fa7ea85a95778ca4ec06134d30599a284c3540752144f1fdc9c1cb8544f2cc13a7ddb478132a00075d93820952a13313bb87
-
SSDEEP
12288:ptapNjL4yL4uaRt9f/JUfA2BMm/In4wqS77Eb7FnPgRh:DapFLXIt9fRUI2umawR4
Static task
static1
Behavioral task
behavioral1
Sample
remittance copy $58,670.00.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
remittance copy $58,670.00.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.itresinc.com - Port:
587 - Username:
[email protected] - Password:
MT]ANFjWzKTA - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.itresinc.com - Port:
587 - Username:
[email protected] - Password:
MT]ANFjWzKTA
Targets
-
-
Target
remittance copy $58,670.00.exe
-
Size
608KB
-
MD5
dd7ac5f2109c2cc61763ae93e4fb955c
-
SHA1
558e89789946fb4cfc3b63bc258ddfe23d42c558
-
SHA256
84b2a0360556088e4aad29627d4ed15d53b18aa72d9d98b4b0d1be27916c681e
-
SHA512
783124beae908538c6e19a710669fa7ea85a95778ca4ec06134d30599a284c3540752144f1fdc9c1cb8544f2cc13a7ddb478132a00075d93820952a13313bb87
-
SSDEEP
12288:ptapNjL4yL4uaRt9f/JUfA2BMm/In4wqS77Eb7FnPgRh:DapFLXIt9fRUI2umawR4
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-