General
-
Target
2a041ed8b40b0a3228a4965a726c0d5817e4f693ac4cc989f0f8716580046f53
-
Size
1008KB
-
Sample
240426-czex6shc7z
-
MD5
5b2ecb3ca674c79176afbe7b3b81c764
-
SHA1
a2f434515abc929f1c875b643546a0f2b710c27d
-
SHA256
2a041ed8b40b0a3228a4965a726c0d5817e4f693ac4cc989f0f8716580046f53
-
SHA512
0a33277520c6485322c36085ee40b0079976a12080b90493ea1e76a08799a2c80c2efd8cdbf0d1e15b20a592ec91a24ec62ccf6f2a725d0efefd93455405627a
-
SSDEEP
24576:MsP3gEmkXsrTpVdJdYJkO2pgTFC2kfOzTePapFNI09w1Q49OjZG:MWsrTTiMR2kfOQOLIsw1QTG
Static task
static1
Behavioral task
behavioral1
Sample
2a041ed8b40b0a3228a4965a726c0d5817e4f693ac4cc989f0f8716580046f53.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a041ed8b40b0a3228a4965a726c0d5817e4f693ac4cc989f0f8716580046f53.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.z2neumec.com - Port:
587 - Username:
guido@z2neumec.com - Password:
Gid@2021
Extracted
agenttesla
Protocol: smtp- Host:
mail.z2neumec.com - Port:
587 - Username:
guido@z2neumec.com - Password:
Gid@2021 - Email To:
straitjohn249@gmail.com
Targets
-
-
Target
2a041ed8b40b0a3228a4965a726c0d5817e4f693ac4cc989f0f8716580046f53
-
Size
1008KB
-
MD5
5b2ecb3ca674c79176afbe7b3b81c764
-
SHA1
a2f434515abc929f1c875b643546a0f2b710c27d
-
SHA256
2a041ed8b40b0a3228a4965a726c0d5817e4f693ac4cc989f0f8716580046f53
-
SHA512
0a33277520c6485322c36085ee40b0079976a12080b90493ea1e76a08799a2c80c2efd8cdbf0d1e15b20a592ec91a24ec62ccf6f2a725d0efefd93455405627a
-
SSDEEP
24576:MsP3gEmkXsrTpVdJdYJkO2pgTFC2kfOzTePapFNI09w1Q49OjZG:MWsrTTiMR2kfOQOLIsw1QTG
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-