General
-
Target
34bf340632905e6c2417d13b8af2347185a6b35ec32c2040a2f8ab7267f6afc9
-
Size
647KB
-
Sample
240320-c4ne4sfe2x
-
MD5
b340abb9a79a0b8b08e275b57b8cbf5b
-
SHA1
b839b72ce055142eff2e1691a12ac8b3623aa897
-
SHA256
34bf340632905e6c2417d13b8af2347185a6b35ec32c2040a2f8ab7267f6afc9
-
SHA512
e942a050fc0756f106b62dcff370161301e86c6513c1682bff0c3718cb611f081e78235a72c412b05d83ab7289862d3eb32dd796df093bf8958d6569c02b7342
-
SSDEEP
12288:elPloOJRYWqbzCCnYcl6fFSKn7e+MKBao12HKGg8BptjG49oQM295QuTBLDyziJl:Y9oOJbKHYcCF9uTNpA49oQn53Td5
Static task
static1
Behavioral task
behavioral1
Sample
34bf340632905e6c2417d13b8af2347185a6b35ec32c2040a2f8ab7267f6afc9.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
34bf340632905e6c2417d13b8af2347185a6b35ec32c2040a2f8ab7267f6afc9.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.lp-partner.cfd - Port:
587 - Username:
[email protected] - Password:
24/7TryLock - Email To:
[email protected]
Targets
-
-
Target
34bf340632905e6c2417d13b8af2347185a6b35ec32c2040a2f8ab7267f6afc9
-
Size
647KB
-
MD5
b340abb9a79a0b8b08e275b57b8cbf5b
-
SHA1
b839b72ce055142eff2e1691a12ac8b3623aa897
-
SHA256
34bf340632905e6c2417d13b8af2347185a6b35ec32c2040a2f8ab7267f6afc9
-
SHA512
e942a050fc0756f106b62dcff370161301e86c6513c1682bff0c3718cb611f081e78235a72c412b05d83ab7289862d3eb32dd796df093bf8958d6569c02b7342
-
SSDEEP
12288:elPloOJRYWqbzCCnYcl6fFSKn7e+MKBao12HKGg8BptjG49oQM295QuTBLDyziJl:Y9oOJbKHYcCF9uTNpA49oQn53Td5
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-