General
-
Target
2916aaeb7d7e58aa792eed52d800227a159ac94d5dbbd95cfa5ec133d3dc90f0
-
Size
539KB
-
Sample
240417-rag4kaag79
-
MD5
c1aed06dd7bdf45a67d94cf79c42f912
-
SHA1
daa371748297f40befe09c1e429d7387f9537c3e
-
SHA256
2916aaeb7d7e58aa792eed52d800227a159ac94d5dbbd95cfa5ec133d3dc90f0
-
SHA512
cce7c61bf0e16b1be53b0ba5858f93114161bcc6696936d27e93899c8c436289df853429d391df7f2fcc71181d46c3890b40f67f8f610edb2cbda029a92d2545
-
SSDEEP
12288:dUquQag6tPTdCuNhSvoEvSqsKLijbDBpf+PdVfSU4de3B89V9/6LU0E4Uxme5g1:d7mg6tbRSv9P12jbD7K0e3Bq0k41
Static task
static1
Behavioral task
behavioral1
Sample
8a3597999df227bed6a515aebd8ecf14468a8e3f23d570af30f42d72b3f6356b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8a3597999df227bed6a515aebd8ecf14468a8e3f23d570af30f42d72b3f6356b.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.myhydropowered.com - Port:
587 - Username:
[email protected] - Password:
yV0cOwpBjCCXLvN - Email To:
[email protected]
Targets
-
-
Target
8a3597999df227bed6a515aebd8ecf14468a8e3f23d570af30f42d72b3f6356b.exe
-
Size
558KB
-
MD5
eef80ad0744688be6c6029e7793dcf91
-
SHA1
35c0251531d08a060807c429e0833b5d48099a9d
-
SHA256
8a3597999df227bed6a515aebd8ecf14468a8e3f23d570af30f42d72b3f6356b
-
SHA512
ed28dbb5861aa55f64a0ff08851df3419275c780bc215a5821d08a49c5f1ccc16b0d7ba635f9394b467a48caef841101254dc8982bd0b28b0a3bdcc661bc870c
-
SSDEEP
12288:EMwrhdMp7SyAHZ5lEhugESlldjfmj/IiZY4CqXr6pSD8gZLI:EMwr0p7STUE6+jdm9qb/8gZI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
6e55a6e7c3fdbd244042eb15cb1ec739
-
SHA1
070ea80e2192abc42f358d47b276990b5fa285a9
-
SHA256
acf90ab6f4edc687e94aaf604d05e16e6cfb5e35873783b50c66f307a35c6506
-
SHA512
2d504b74da38edc967e3859733a2a9cacd885db82f0ca69bfb66872e882707314c54238344d45945dc98bae85772aceef71a741787922d640627d3c8ae8f1c35
-
SSDEEP
192:MenY0qWTlt70IAj/lQ0sEWc/wtYbBH2aDybC7y+XBaIwL:M8+Qlt70Fj/lQRY/9VjjgL
Score3/10 -