General
-
Target
copy1065271118.exe
-
Size
208KB
-
Sample
240429-r3pn4sda82
-
MD5
1ced29f06f2257b908d62139dece62a6
-
SHA1
2717a31978b483a3257ebb996ff522359a10ded0
-
SHA256
267ce4785bf50413832611771a779f00c9c81eec65cc0ac2e8a4ff150bfbe2ec
-
SHA512
b61bc78ea1f86c922f3bc8280af20ed84834657b20ec1f1c4c9b5d5216781294ec7803d9ac7fc131245c74c54c99626470841630b4b65a787fee46bb04f5739e
-
SSDEEP
3072:yfu3oRiKNnCDDRvLGmrOAOkGt6+duWA/t/SHUebbxCbGgKk12qk/oPYm21KLbDoM:fooWstvLGtELbMUTKZ
Static task
static1
Behavioral task
behavioral1
Sample
copy1065271118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
copy1065271118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
YuWsikfV67lD - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
YuWsikfV67lD
Targets
-
-
Target
copy1065271118.exe
-
Size
208KB
-
MD5
1ced29f06f2257b908d62139dece62a6
-
SHA1
2717a31978b483a3257ebb996ff522359a10ded0
-
SHA256
267ce4785bf50413832611771a779f00c9c81eec65cc0ac2e8a4ff150bfbe2ec
-
SHA512
b61bc78ea1f86c922f3bc8280af20ed84834657b20ec1f1c4c9b5d5216781294ec7803d9ac7fc131245c74c54c99626470841630b4b65a787fee46bb04f5739e
-
SSDEEP
3072:yfu3oRiKNnCDDRvLGmrOAOkGt6+duWA/t/SHUebbxCbGgKk12qk/oPYm21KLbDoM:fooWstvLGtELbMUTKZ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-