General
-
Target
CV Mariana Alvarez.exe
-
Size
769KB
-
Sample
240327-sdfwcaef29
-
MD5
8519bf7e8a082125a8f8e78e94eb6d49
-
SHA1
e909b99cec15cc0de660d062994e508308a6a1ae
-
SHA256
ba40c8faca19c45d887bb88acbc541e6d08e574fb0720a07656ee4d6cda202ae
-
SHA512
439935219597ac1d0d8d4dce116861b7ac6ec8181bfd3939c2c3e4aeab3f04b6e134473260ca85d8548a8f57a71eac9cb5591a473044626a3d2dd63f49204ae0
-
SSDEEP
12288:T7spRsBnr4VL+Dvg+jomvyMm+LTJSgaSK7q4VmnPjhz4tw3FKlzNevL7V:EpRsyBYoxl+P4rS4q2mP2C8lzq
Static task
static1
Behavioral task
behavioral1
Sample
CV Mariana Alvarez.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CV Mariana Alvarez.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.flying-fish-cn.com - Port:
587 - Username:
[email protected] - Password:
hkk999@@@
Extracted
agenttesla
Protocol: smtp- Host:
smtp.flying-fish-cn.com - Port:
587 - Username:
[email protected] - Password:
hkk999@@@ - Email To:
[email protected]
Targets
-
-
Target
CV Mariana Alvarez.exe
-
Size
769KB
-
MD5
8519bf7e8a082125a8f8e78e94eb6d49
-
SHA1
e909b99cec15cc0de660d062994e508308a6a1ae
-
SHA256
ba40c8faca19c45d887bb88acbc541e6d08e574fb0720a07656ee4d6cda202ae
-
SHA512
439935219597ac1d0d8d4dce116861b7ac6ec8181bfd3939c2c3e4aeab3f04b6e134473260ca85d8548a8f57a71eac9cb5591a473044626a3d2dd63f49204ae0
-
SSDEEP
12288:T7spRsBnr4VL+Dvg+jomvyMm+LTJSgaSK7q4VmnPjhz4tw3FKlzNevL7V:EpRsyBYoxl+P4rS4q2mP2C8lzq
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-