General
-
Target
7628ace4f2627bc65377a8123ce9e05849e4e4b3fd5b862e03ffcee42274ccfb.zip
-
Size
669KB
-
Sample
240425-gr3rgsgd8w
-
MD5
648b260c2e18c52bfd8f8add6623a957
-
SHA1
ae894bc10fa4e163288f5c478b339ca361729cd2
-
SHA256
7c300f7ab5c7b6e94a47551cd260ed1206a8bd12464cdec10411110e734041ec
-
SHA512
8a04f4e6980fe04df408b8f69e03032564537a1e3dd43f5acfcd87af669ff207d02a50e8b3c254266337cf99fc71f485fbadfa253d5f5f9caed746f02665f3e9
-
SSDEEP
12288:Rsd0AkLMKuAkp2s2lqoEU0i/B8BQyeQyMLJTEfFkrDjZcJ/xiuHOb703R3+:CdeuAu2sYqG0u4QyeQyMdmFkA/Exl
Static task
static1
Behavioral task
behavioral1
Sample
7628ace4f2627bc65377a8123ce9e05849e4e4b3fd5b862e03ffcee42274ccfb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7628ace4f2627bc65377a8123ce9e05849e4e4b3fd5b862e03ffcee42274ccfb.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.nationalkham.com - Port:
587 - Username:
[email protected] - Password:
kham1234 - Email To:
[email protected]
Targets
-
-
Target
7628ace4f2627bc65377a8123ce9e05849e4e4b3fd5b862e03ffcee42274ccfb.exe
-
Size
708KB
-
MD5
946a0735432aca25fa370970e97a3dbb
-
SHA1
9ffac6be378c7379a8ea11a5a439445a46f6bb5c
-
SHA256
7628ace4f2627bc65377a8123ce9e05849e4e4b3fd5b862e03ffcee42274ccfb
-
SHA512
9a54f14e47637dd6001ec2426111af5cbf18d96ef2d1fc320d15ba86722d7a445029354e91d82b58617180e141f207245ffb0c15b46fdb89253333c85c77f461
-
SSDEEP
12288:PWYIPXjxannnHg2r+Eu1ed8MBqIg5B+gZ9r/XIc/P/EtnOG96TchIf6+Xn7M:PWYIPFannnHg2r1uc3Bqr5QgZl/PAOGb
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-