General
-
Target
b57cef37484d6731aef9ca1156ad7ebbdda16fedf4c96fd1b8371530582f5d48
-
Size
745KB
-
Sample
240330-blc1zsdf8s
-
MD5
612b4992d513cfff18282f683e73ecf9
-
SHA1
f1470207b5e07d501ad383286ae4aec9d7b5bb58
-
SHA256
b57cef37484d6731aef9ca1156ad7ebbdda16fedf4c96fd1b8371530582f5d48
-
SHA512
a1c3c8a03ca951000c88d92a4f00959e2f8237ae55212d1a26fcbfd23ce2149ec78c5b98ef7f9e322f8e6648b3831fc1177aec6b4495462b1198dc62e690313b
-
SSDEEP
12288:vdYU27LK1OLD8U0FUAY4sm2oIGZ9mbFg67KfI5z79N26L1egXMVEIP5+YEwN2:v6U27iOLASdLm2oIWmbF/J5v9gwD
Static task
static1
Behavioral task
behavioral1
Sample
b57cef37484d6731aef9ca1156ad7ebbdda16fedf4c96fd1b8371530582f5d48.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b57cef37484d6731aef9ca1156ad7ebbdda16fedf4c96fd1b8371530582f5d48.exe
Resource
win10v2004-20240319-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
pro51.emailserver.vn - Port:
587 - Username:
[email protected] - Password:
O{AG(tbFk2.Y - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
pro51.emailserver.vn - Port:
587 - Username:
[email protected] - Password:
O{AG(tbFk2.Y
Targets
-
-
Target
b57cef37484d6731aef9ca1156ad7ebbdda16fedf4c96fd1b8371530582f5d48
-
Size
745KB
-
MD5
612b4992d513cfff18282f683e73ecf9
-
SHA1
f1470207b5e07d501ad383286ae4aec9d7b5bb58
-
SHA256
b57cef37484d6731aef9ca1156ad7ebbdda16fedf4c96fd1b8371530582f5d48
-
SHA512
a1c3c8a03ca951000c88d92a4f00959e2f8237ae55212d1a26fcbfd23ce2149ec78c5b98ef7f9e322f8e6648b3831fc1177aec6b4495462b1198dc62e690313b
-
SSDEEP
12288:vdYU27LK1OLD8U0FUAY4sm2oIGZ9mbFg67KfI5z79N26L1egXMVEIP5+YEwN2:v6U27iOLASdLm2oIWmbF/J5v9gwD
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-