General
-
Target
Remittance Copy.exe
-
Size
228KB
-
Sample
240416-ppkrwsca7w
-
MD5
74610276c52d19093bfc48ac34dc391c
-
SHA1
b33c23dd203f3787dd6ef067ca1f9b69ffb00869
-
SHA256
5bf6bff01e3a5371d8e839b002fcd48ce8b7b6a3bf029a5811dae4c6e10cdc6f
-
SHA512
efbf882c88404354400b1dae23d728ba4a3a7c3e45911f297b5d2fe25b3ce12c6356b729eb12c4dc7741a63303a532485b11c39b4198f05d38e54183af3d672f
-
SSDEEP
3072:dRRNAsvXc3zLU6Zm6+yQv6F6E/K5gNvk+g/yD1QrRe7Bjal7AdRI7zr3lMoft7GU:disOLIQ6E/K5gfg/K+07B9OzTGz
Static task
static1
Behavioral task
behavioral1
Sample
Remittance Copy.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.seatech.co.ke - Port:
587 - Username:
[email protected] - Password:
seatech@2023 - Email To:
[email protected]
Targets
-
-
Target
Remittance Copy.exe
-
Size
228KB
-
MD5
74610276c52d19093bfc48ac34dc391c
-
SHA1
b33c23dd203f3787dd6ef067ca1f9b69ffb00869
-
SHA256
5bf6bff01e3a5371d8e839b002fcd48ce8b7b6a3bf029a5811dae4c6e10cdc6f
-
SHA512
efbf882c88404354400b1dae23d728ba4a3a7c3e45911f297b5d2fe25b3ce12c6356b729eb12c4dc7741a63303a532485b11c39b4198f05d38e54183af3d672f
-
SSDEEP
3072:dRRNAsvXc3zLU6Zm6+yQv6F6E/K5gNvk+g/yD1QrRe7Bjal7AdRI7zr3lMoft7GU:disOLIQ6E/K5gfg/K+07B9OzTGz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-