General
-
Target
9a87300066edcd42c6a53f1af9f04aa5.bin
-
Size
255KB
-
Sample
240417-b2p1gsab54
-
MD5
2c42f88739f9c5ced6d0b7acf37999e9
-
SHA1
217df753f322193cc6db227d4c0514af36085444
-
SHA256
99611329713109741b7f65d25c16155a9f8cdb368d9c9465e9262aac97745a2d
-
SHA512
6af6b2a11dda2799cff8421e2db397cb3c89dec606eff46f7fcb75da38cdf4a3dcb3689111a95fe7ef0a3f1b9df89d663d04375956ea7ff41a0c45c0f2f77f10
-
SSDEEP
6144:ZobYNxgmtDVCwmD9V8wb56Ip9bjYfFlVoFBkvatp/ryW1k2VY:qbYNxTy4wbPXbsfFlVonp/eW1k26
Static task
static1
Behavioral task
behavioral1
Sample
b221fbbba9145479c60a63b77da5c52785a2f11ae697a6eb7224f930bbda9cdf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b221fbbba9145479c60a63b77da5c52785a2f11ae697a6eb7224f930bbda9cdf.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
Asaprocky11 - Email To:
[email protected]
Targets
-
-
Target
b221fbbba9145479c60a63b77da5c52785a2f11ae697a6eb7224f930bbda9cdf.exe
-
Size
345KB
-
MD5
9a87300066edcd42c6a53f1af9f04aa5
-
SHA1
2b1a96c79151bc1e9d8e5d87fab6c84d55b74ac1
-
SHA256
b221fbbba9145479c60a63b77da5c52785a2f11ae697a6eb7224f930bbda9cdf
-
SHA512
688971463b3db014a01d9da8cc656968b8c7a4933cd1f17671180ee1e28ee612ee27a4021bcbf7678cdab159c0988ec859e2df6f4ae7075b57e3cc7b8b5ffbfa
-
SSDEEP
6144:bRSEAhZalpfBcl7UqXJSbs+6ucHac1jACZ/rYcPdqbmodhATW7qrMv17eysNc:NSnHpSqXJn+6ucL1nrYc1qKu4W7qgv9C
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-