General
-
Target
549ed35d30e4a67640e3f2d6c6ab4dad953b30ed6fc2db6fa39c00e7cd59135c
-
Size
9.4MB
-
Sample
240430-cffqcshf9z
-
MD5
7dcbac367f0e14d9edef0d20e2c1f11d
-
SHA1
c319d4e68dc4c12ce1c4c56d5285b6f605647764
-
SHA256
549ed35d30e4a67640e3f2d6c6ab4dad953b30ed6fc2db6fa39c00e7cd59135c
-
SHA512
454497a5b15f3b2bbff03854e43297f409057f99959423ea7262e2dabd4d12592eb2d6dce2b28406c11a5f642780a52a0a6897b557894ee294cd9c77b2a394b6
-
SSDEEP
196608:mIfCgf7qzhAzzyxaTsa8MZywc8JI9F7EhftMPOUiQm6bEZwj6R6HuMTpul0D7Bkt:mIfCgf7qzhAzzyxaTsa8MZywc8JI9F7Y
Static task
static1
Behavioral task
behavioral1
Sample
549ed35d30e4a67640e3f2d6c6ab4dad953b30ed6fc2db6fa39c00e7cd59135c.exe
Resource
win7-20240215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server314.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
Sge9tb04^QPR - Email To:
[email protected]
Targets
-
-
Target
549ed35d30e4a67640e3f2d6c6ab4dad953b30ed6fc2db6fa39c00e7cd59135c
-
Size
9.4MB
-
MD5
7dcbac367f0e14d9edef0d20e2c1f11d
-
SHA1
c319d4e68dc4c12ce1c4c56d5285b6f605647764
-
SHA256
549ed35d30e4a67640e3f2d6c6ab4dad953b30ed6fc2db6fa39c00e7cd59135c
-
SHA512
454497a5b15f3b2bbff03854e43297f409057f99959423ea7262e2dabd4d12592eb2d6dce2b28406c11a5f642780a52a0a6897b557894ee294cd9c77b2a394b6
-
SSDEEP
196608:mIfCgf7qzhAzzyxaTsa8MZywc8JI9F7EhftMPOUiQm6bEZwj6R6HuMTpul0D7Bkt:mIfCgf7qzhAzzyxaTsa8MZywc8JI9F7Y
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-