General
-
Target
Azizi Riviera Azure works.exe
-
Size
607KB
-
Sample
240405-g26wwseb92
-
MD5
9b7e70f3b5a86ca521eb20529771a83b
-
SHA1
2158d8a9e5bb6e3c4825d2a67d1abc0117ebe5e9
-
SHA256
8506e0fdcf9ce49bd939a62bacd3e4d1af3522d72e660382684b1e4d1bb8e6b7
-
SHA512
684b5d7a03bd42373692dd38d5ac687b25ec35cf42072f91081c34be4086b3ec20af6abfb34c1a8a914ebb8a0cfb7fd13e7d408dfdc581e6cd04ccf14df62944
-
SSDEEP
12288:eRUHJhAyLS/6eg08NxFoi5YLAPg7iTYoq/HsGMpaJ4eYSn:PHJhR00noOYMPhT6iaJNln
Static task
static1
Behavioral task
behavioral1
Sample
Azizi Riviera Azure works.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Azizi Riviera Azure works.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mth.ae - Port:
587 - Username:
[email protected] - Password:
Mth@13795 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.mth.ae - Port:
587 - Username:
[email protected] - Password:
Mth@13795
Targets
-
-
Target
Azizi Riviera Azure works.exe
-
Size
607KB
-
MD5
9b7e70f3b5a86ca521eb20529771a83b
-
SHA1
2158d8a9e5bb6e3c4825d2a67d1abc0117ebe5e9
-
SHA256
8506e0fdcf9ce49bd939a62bacd3e4d1af3522d72e660382684b1e4d1bb8e6b7
-
SHA512
684b5d7a03bd42373692dd38d5ac687b25ec35cf42072f91081c34be4086b3ec20af6abfb34c1a8a914ebb8a0cfb7fd13e7d408dfdc581e6cd04ccf14df62944
-
SSDEEP
12288:eRUHJhAyLS/6eg08NxFoi5YLAPg7iTYoq/HsGMpaJ4eYSn:PHJhR00noOYMPhT6iaJNln
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-