General
-
Target
2bb91cb12d94dfc4ed8874b825ce50d70b049ce989b01b0991e75d30ae24f480
-
Size
2.2MB
-
Sample
240430-bw478agh4s
-
MD5
b9eb55d6232f4f4ff2e5a11d23c668a3
-
SHA1
36c6f4dc1df713d587ca033c1f9ca12cf76fc771
-
SHA256
2bb91cb12d94dfc4ed8874b825ce50d70b049ce989b01b0991e75d30ae24f480
-
SHA512
c4170eaa71c666f76ddbbcbc55026ac38464df5566ac4528b5cc6cc7334548a832bcf62bad1cf05682351d01a6ef349af9141d3afd27aeb64494e5e491230ce6
-
SSDEEP
49152:g8zUcHrw7FvJJD+FXkUru1lyA6bk7cjpmYBA3F4sEOPlVufPA5J/d232M:Fxrw71O4lNEkIjpBAWe4fPQA2
Static task
static1
Behavioral task
behavioral1
Sample
2bb91cb12d94dfc4ed8874b825ce50d70b049ce989b01b0991e75d30ae24f480.exe
Resource
win7-20240220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gencoldfire.com - Port:
587 - Username:
[email protected] - Password:
mh7B/7[hSO#bYHw1 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.gencoldfire.com - Port:
587 - Username:
[email protected] - Password:
mh7B/7[hSO#bYHw1
Targets
-
-
Target
2bb91cb12d94dfc4ed8874b825ce50d70b049ce989b01b0991e75d30ae24f480
-
Size
2.2MB
-
MD5
b9eb55d6232f4f4ff2e5a11d23c668a3
-
SHA1
36c6f4dc1df713d587ca033c1f9ca12cf76fc771
-
SHA256
2bb91cb12d94dfc4ed8874b825ce50d70b049ce989b01b0991e75d30ae24f480
-
SHA512
c4170eaa71c666f76ddbbcbc55026ac38464df5566ac4528b5cc6cc7334548a832bcf62bad1cf05682351d01a6ef349af9141d3afd27aeb64494e5e491230ce6
-
SSDEEP
49152:g8zUcHrw7FvJJD+FXkUru1lyA6bk7cjpmYBA3F4sEOPlVufPA5J/d232M:Fxrw71O4lNEkIjpBAWe4fPQA2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-