General
-
Target
e05771e0ff928ffc39c22b34ae91a012231c27986ca8af9dce606f62c9e442d2
-
Size
1.1MB
-
Sample
240429-bpjypsed8s
-
MD5
af511189872d41f53c9f69d39bdc567c
-
SHA1
65d242875b6475a9ac3739b0ad3a37c01068df55
-
SHA256
e05771e0ff928ffc39c22b34ae91a012231c27986ca8af9dce606f62c9e442d2
-
SHA512
4df5f06d0d2c861440c61efa22c0af117408d5270f6d3384079d693be9bfa92cf478d98f3473536a91cad64ae32b03aeba06ed76b76af857cbbafc505d9ab49f
-
SSDEEP
24576:jAHnh+eWsN3skA4RV1Hom2KXMmHayu70nNaAvQON+N5:uh+ZkldoPK8YayuwNbI
Static task
static1
Behavioral task
behavioral1
Sample
e05771e0ff928ffc39c22b34ae91a012231c27986ca8af9dce606f62c9e442d2.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
e05771e0ff928ffc39c22b34ae91a012231c27986ca8af9dce606f62c9e442d2.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
premium185.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
cooldown2013 - Email To:
[email protected]
Targets
-
-
Target
e05771e0ff928ffc39c22b34ae91a012231c27986ca8af9dce606f62c9e442d2
-
Size
1.1MB
-
MD5
af511189872d41f53c9f69d39bdc567c
-
SHA1
65d242875b6475a9ac3739b0ad3a37c01068df55
-
SHA256
e05771e0ff928ffc39c22b34ae91a012231c27986ca8af9dce606f62c9e442d2
-
SHA512
4df5f06d0d2c861440c61efa22c0af117408d5270f6d3384079d693be9bfa92cf478d98f3473536a91cad64ae32b03aeba06ed76b76af857cbbafc505d9ab49f
-
SSDEEP
24576:jAHnh+eWsN3skA4RV1Hom2KXMmHayu70nNaAvQON+N5:uh+ZkldoPK8YayuwNbI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-