General
-
Target
9e246638ebd385ca880c0e263f3e406243b897c0162ef2ff2635f1af3756046b
-
Size
2.2MB
-
Sample
240430-bwyensgd53
-
MD5
4f3c5e74a09c20cb2bd9de3d3db22e7b
-
SHA1
f971dc104eb76e3e82438e1d1d9b13809538786e
-
SHA256
9e246638ebd385ca880c0e263f3e406243b897c0162ef2ff2635f1af3756046b
-
SHA512
f9b13c48705f23836d40e697cd1ae55892b93f5dd05f76654695abd9dcf883620ee87f255b2c405bb05d540e4d8a3571f4de8986f5371ee1c0e5aa096d126f48
-
SSDEEP
49152:awf540hBL2cdmrA8nSl8bvwxJthIbIN3RKlPEcA8bVNBR/:awW0KcdgSl8bvwxVlN3RuPEcrZ7R/
Static task
static1
Behavioral task
behavioral1
Sample
9e246638ebd385ca880c0e263f3e406243b897c0162ef2ff2635f1af3756046b.exe
Resource
win7-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
CCu5Z?WuH+bS4hsz - Email To:
[email protected]
Targets
-
-
Target
9e246638ebd385ca880c0e263f3e406243b897c0162ef2ff2635f1af3756046b
-
Size
2.2MB
-
MD5
4f3c5e74a09c20cb2bd9de3d3db22e7b
-
SHA1
f971dc104eb76e3e82438e1d1d9b13809538786e
-
SHA256
9e246638ebd385ca880c0e263f3e406243b897c0162ef2ff2635f1af3756046b
-
SHA512
f9b13c48705f23836d40e697cd1ae55892b93f5dd05f76654695abd9dcf883620ee87f255b2c405bb05d540e4d8a3571f4de8986f5371ee1c0e5aa096d126f48
-
SSDEEP
49152:awf540hBL2cdmrA8nSl8bvwxJthIbIN3RKlPEcA8bVNBR/:awW0KcdgSl8bvwxVlN3RuPEcrZ7R/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-