General
-
Target
8031f29ca671c9c658a3ecc57e27257df6b0b562fce7bee6c8790203632d175e
-
Size
625KB
-
Sample
240417-p4vweahe51
-
MD5
e8c58053bc7a2a87d43f0294e452b7ad
-
SHA1
f394542685ffaee57f6e3fdfc1277f5c16c0caa1
-
SHA256
8031f29ca671c9c658a3ecc57e27257df6b0b562fce7bee6c8790203632d175e
-
SHA512
64358d57b749ee3a949f11952fb632f6ea26a3512ecaca0763aa7f516a20153c292e48ed8287614c0893e1e2409b4fd464787a2d7d7987ccaf70dc3aad83c2ef
-
SSDEEP
12288:q4XylStUqRVnqtn0iQhSHt17Zmy3aT6MWxA/nc+RinpEawp6:q4iQFU3Rql+q1RRaC6
Static task
static1
Behavioral task
behavioral1
Sample
33fa911dd004b649e230afe01f281a477a67b0a84b42cd71548a5b899b41e6dc.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
33fa911dd004b649e230afe01f281a477a67b0a84b42cd71548a5b899b41e6dc.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
$F%bWyL5 - Email To:
[email protected]
Targets
-
-
Target
33fa911dd004b649e230afe01f281a477a67b0a84b42cd71548a5b899b41e6dc.exe
-
Size
651KB
-
MD5
00e30e1804f2430265b1cefeb129c0ca
-
SHA1
92d2ac8c14544693c00c46139e38a248ebc894af
-
SHA256
33fa911dd004b649e230afe01f281a477a67b0a84b42cd71548a5b899b41e6dc
-
SHA512
97599f4fca7f8de8dfac3133ef5c02a4afd25f1421676b5c9e92ecaaf4aeb6a67dd843c475d4aae0d685f866178ec40a96404f885594744fda29322c9c11222b
-
SSDEEP
12288:qnBEbI7vijPHnMvEsHFZt6oy3/WAp6ibZNHgn8oh9a0oz1q8X31VOkZ5KvgwSWy:qB2ILijwEs3Qr3x6qv8h9Ho5q8XvOBvm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-