General
-
Target
00121128902.exe
-
Size
341KB
-
Sample
240403-p6xg1sdd3v
-
MD5
652622e0836e2075b83880ab4acc1b6a
-
SHA1
4891d4d08f5d4d2c0290c00d6cabb4974aae211f
-
SHA256
5a5f6b9e0b9e49eb5373a2919417a90bcd8edfbdfda70d910eddb0fb5c131fa3
-
SHA512
3509ec3dfd35bca7c27121b9b1749cbab444f64c60cc501a560ff33ade83d9eead8eb2a9e3556d704afe8d98deabd2f3730ad93315674ee8e0a6212affdbd1c0
-
SSDEEP
6144:j0jB/wB5x7M7RJfc1Msh0BWbgZMgAlo+kxWv75gheXOfD4txABUC16Vc8:givo7kOsh2VZRAy+sIgdblB6
Static task
static1
Behavioral task
behavioral1
Sample
00121128902.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00121128902.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.ramayindian.com - Port:
587 - Username:
[email protected] - Password:
Badsha2018$
Extracted
agenttesla
Protocol: smtp- Host:
mail.ramayindian.com - Port:
587 - Username:
[email protected] - Password:
Badsha2018$ - Email To:
[email protected]
Targets
-
-
Target
00121128902.exe
-
Size
341KB
-
MD5
652622e0836e2075b83880ab4acc1b6a
-
SHA1
4891d4d08f5d4d2c0290c00d6cabb4974aae211f
-
SHA256
5a5f6b9e0b9e49eb5373a2919417a90bcd8edfbdfda70d910eddb0fb5c131fa3
-
SHA512
3509ec3dfd35bca7c27121b9b1749cbab444f64c60cc501a560ff33ade83d9eead8eb2a9e3556d704afe8d98deabd2f3730ad93315674ee8e0a6212affdbd1c0
-
SSDEEP
6144:j0jB/wB5x7M7RJfc1Msh0BWbgZMgAlo+kxWv75gheXOfD4txABUC16Vc8:givo7kOsh2VZRAy+sIgdblB6
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-