General
-
Target
79a1f078c909b86de8658198c0fbb55043ed3161473c53f19ae832b513c79b90
-
Size
8.8MB
-
Sample
240427-b3vmcsgd67
-
MD5
26fb5f7f41cfdb6c929e8c87d188c1f1
-
SHA1
38477d12283afc8cee36926ab88342dac917a648
-
SHA256
79a1f078c909b86de8658198c0fbb55043ed3161473c53f19ae832b513c79b90
-
SHA512
60cf33a703067f1dec813cc576b94da0a04ad1fbc91fdd9f20ad71007d97f5099f9451774dcc20e3bbb00864e0ea54dc83e28149c156597f61f2f41499800f91
-
SSDEEP
196608:zgeDgzp082tGd3GqWK/I8u/LCdhY1ZJ6a94V+oITWbcaQ+GpwNd6M8MVSXI7vEd1:zgeDgzp082tGd3GqWK/I8u/LCdhY1ZJZ
Static task
static1
Behavioral task
behavioral1
Sample
79a1f078c909b86de8658198c0fbb55043ed3161473c53f19ae832b513c79b90.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
d9GOyTceXsMT - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
d9GOyTceXsMT
Targets
-
-
Target
79a1f078c909b86de8658198c0fbb55043ed3161473c53f19ae832b513c79b90
-
Size
8.8MB
-
MD5
26fb5f7f41cfdb6c929e8c87d188c1f1
-
SHA1
38477d12283afc8cee36926ab88342dac917a648
-
SHA256
79a1f078c909b86de8658198c0fbb55043ed3161473c53f19ae832b513c79b90
-
SHA512
60cf33a703067f1dec813cc576b94da0a04ad1fbc91fdd9f20ad71007d97f5099f9451774dcc20e3bbb00864e0ea54dc83e28149c156597f61f2f41499800f91
-
SSDEEP
196608:zgeDgzp082tGd3GqWK/I8u/LCdhY1ZJ6a94V+oITWbcaQ+GpwNd6M8MVSXI7vEd1:zgeDgzp082tGd3GqWK/I8u/LCdhY1ZJZ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-