General
-
Target
475bf2a23c54406a6f6e4ac69ec99e6f2f7758e994b8b68d6bab71af54a358f2
-
Size
2.3MB
-
Sample
240330-btevjsdh9t
-
MD5
ef82536165f246d38dbc72f02c2593cb
-
SHA1
f8f68bd5381efebeed80c1fc59c67e3d85407ff4
-
SHA256
475bf2a23c54406a6f6e4ac69ec99e6f2f7758e994b8b68d6bab71af54a358f2
-
SHA512
d862a41b0085c1ff1df5f6c0d9c31943e58b9635ded0fcc11aeed8f21670f299c8a977797575121d35b280896995782e50cdce36c4b8ad8f8c6700c4a72834d9
-
SSDEEP
24576:iwJ9GJuHxNIt9LA7/gWXUI3rwTXaLsGBYzXg8vPe4lQLc8EYanY+2XQdSXNxhN8n:bkcyGbG2sZ5lQLPod6x3pZOo1
Static task
static1
Behavioral task
behavioral1
Sample
475bf2a23c54406a6f6e4ac69ec99e6f2f7758e994b8b68d6bab71af54a358f2.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
OBC#75@tsGreenPass@5974a - Email To:
[email protected]
Targets
-
-
Target
475bf2a23c54406a6f6e4ac69ec99e6f2f7758e994b8b68d6bab71af54a358f2
-
Size
2.3MB
-
MD5
ef82536165f246d38dbc72f02c2593cb
-
SHA1
f8f68bd5381efebeed80c1fc59c67e3d85407ff4
-
SHA256
475bf2a23c54406a6f6e4ac69ec99e6f2f7758e994b8b68d6bab71af54a358f2
-
SHA512
d862a41b0085c1ff1df5f6c0d9c31943e58b9635ded0fcc11aeed8f21670f299c8a977797575121d35b280896995782e50cdce36c4b8ad8f8c6700c4a72834d9
-
SSDEEP
24576:iwJ9GJuHxNIt9LA7/gWXUI3rwTXaLsGBYzXg8vPe4lQLc8EYanY+2XQdSXNxhN8n:bkcyGbG2sZ5lQLPod6x3pZOo1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-