General
-
Target
2401e32079dc812f688e5ddc4ecf94109e067892235fe41556a3aae1ea5db014
-
Size
2.4MB
-
Sample
240405-bmabgsgg32
-
MD5
e648240d67809a7b4e6a4e79565ea6f6
-
SHA1
30dc1ffc9a690dab07ec5e393ee568b0ae421743
-
SHA256
2401e32079dc812f688e5ddc4ecf94109e067892235fe41556a3aae1ea5db014
-
SHA512
685eaae8216131f42f0e0bf7d0e1d01ae03245b7bff790db37c598e9f2225b0944345d431c965a91832cdf25b3432fb53af3acbccb190797cb1a116ef9feac4a
-
SSDEEP
49152:zVhm2zSoKvLPWMKv0qKvsDtOU2JGSoAQlsWSHFIJx0kRDB4G8zVytzA5:fm2zbKvLeMyKvI4UcdWM2bh4G2yA5
Static task
static1
Behavioral task
behavioral1
Sample
2401e32079dc812f688e5ddc4ecf94109e067892235fe41556a3aae1ea5db014.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gencoldfire.com - Port:
587 - Username:
[email protected] - Password:
mh7B/7[hSO#bYHw1 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.gencoldfire.com - Port:
587 - Username:
[email protected] - Password:
mh7B/7[hSO#bYHw1
Targets
-
-
Target
2401e32079dc812f688e5ddc4ecf94109e067892235fe41556a3aae1ea5db014
-
Size
2.4MB
-
MD5
e648240d67809a7b4e6a4e79565ea6f6
-
SHA1
30dc1ffc9a690dab07ec5e393ee568b0ae421743
-
SHA256
2401e32079dc812f688e5ddc4ecf94109e067892235fe41556a3aae1ea5db014
-
SHA512
685eaae8216131f42f0e0bf7d0e1d01ae03245b7bff790db37c598e9f2225b0944345d431c965a91832cdf25b3432fb53af3acbccb190797cb1a116ef9feac4a
-
SSDEEP
49152:zVhm2zSoKvLPWMKv0qKvsDtOU2JGSoAQlsWSHFIJx0kRDB4G8zVytzA5:fm2zbKvLeMyKvI4UcdWM2bh4G2yA5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-