General
-
Target
4776383f4cd8e297f81bcb0058366ca4e32b44d79e64d5fd7f4622a1afcdf497
-
Size
548KB
-
Sample
240430-bq8cpagb68
-
MD5
39e6e0f908311fab6bad80b374be266f
-
SHA1
333d1a9821fb3fff91448b5a9e2cdee04fc722b4
-
SHA256
4776383f4cd8e297f81bcb0058366ca4e32b44d79e64d5fd7f4622a1afcdf497
-
SHA512
cbc7811367679724ed09dbc82729cb16257a9ed1a47dfb9dd65c5b13ff27bbe2b1f21f2f40bfb8e03e83e677b371ad35d0fc91c4b6f92f7cd957932f3c5019e6
-
SSDEEP
12288:33JDduBcdk7Bk5gznbyeBDiWGHPZPvvzlOP7r9r/+ppppppppppppppppppppppJ:HJzABWgqeti1x3RO1q
Static task
static1
Behavioral task
behavioral1
Sample
4776383f4cd8e297f81bcb0058366ca4e32b44d79e64d5fd7f4622a1afcdf497.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4776383f4cd8e297f81bcb0058366ca4e32b44d79e64d5fd7f4622a1afcdf497.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.voivocars.com - Port:
587 - Username:
[email protected] - Password:
qwerty123 - Email To:
[email protected]
Targets
-
-
Target
4776383f4cd8e297f81bcb0058366ca4e32b44d79e64d5fd7f4622a1afcdf497
-
Size
548KB
-
MD5
39e6e0f908311fab6bad80b374be266f
-
SHA1
333d1a9821fb3fff91448b5a9e2cdee04fc722b4
-
SHA256
4776383f4cd8e297f81bcb0058366ca4e32b44d79e64d5fd7f4622a1afcdf497
-
SHA512
cbc7811367679724ed09dbc82729cb16257a9ed1a47dfb9dd65c5b13ff27bbe2b1f21f2f40bfb8e03e83e677b371ad35d0fc91c4b6f92f7cd957932f3c5019e6
-
SSDEEP
12288:33JDduBcdk7Bk5gznbyeBDiWGHPZPvvzlOP7r9r/+ppppppppppppppppppppppJ:HJzABWgqeti1x3RO1q
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-