General
-
Target
092b37bf4845038e86a1d8abec9e3c2b.bin
-
Size
633KB
-
Sample
240428-bc29hscg4x
-
MD5
4fc4f3fc02f5277cf2be8891d80aa1d7
-
SHA1
4ee44822d7b06d0975a13ac206c4c1c72175b6c8
-
SHA256
9ef6e15de85ecf471b02bd8e21025ef119670194f53e0f3ec47daada3f5c6ee4
-
SHA512
82d641e2f01dfd1126dabd741475fae86ccf7f09b5e2f8925f4efcf1ac5fea8fc1f04412ffad42067282a88661b6ba233fc3b3239170f8747c74119fcbe1d711
-
SSDEEP
12288:9m5xITlBrBTy1jUcSEKRD67Csuxt8H6U8kVbKOHxLFikN:9m5xITlBrU1HSEsht8HaiQm
Static task
static1
Behavioral task
behavioral1
Sample
PO#50124.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PO#50124.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.alkuwaiti.com - Port:
587 - Username:
[email protected] - Password:
Ele@1804 - Email To:
[email protected]
Targets
-
-
Target
PO#50124.exe
-
Size
668KB
-
MD5
b4306234a3b45c69df6a6a7cecd6070c
-
SHA1
323197c988bc794e3a6314fce81dc20c48d234ee
-
SHA256
13129eaaaee8200a17214e947f0e984d10050e79c2cd5a963d7ada54ce3aa0a8
-
SHA512
a30bd4b6365ced8bf53fd6f57c0e30896bdea733305c2c51bd4e63f7c3451a12b64e85cd16c292a02cae6ae2083532ec72ff5151dfed7aa708279aa259cefe16
-
SSDEEP
12288:cHgnFyHgP/NbIyeSPqBFAbCS2m+2hTMRZuEAFgzknK7N8VJqaW:c+yHs/Nt8BUCmZhTGZuBFKR8V
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-