General
-
Target
signed documents and BOL..exe
-
Size
713KB
-
Sample
240501-fv6rwagg3w
-
MD5
94429681dc767a26304ebe746df41b64
-
SHA1
9003339358b76abd29923035ede75336a22129fb
-
SHA256
1c9d7294c27649d4749a4a3e8c08cdd88fab4e7835cda473a6dde5aca7080a48
-
SHA512
2b1800de7471415f968665120914a80c0bcc46c5b527c63644e39fb15e4099f3f70e8ea36090a99e887efe447fa9e602531da11452dbe52e4ee2d2566fc93acd
-
SSDEEP
12288:HxN5JkuAgIWlMtlgtoyewj5WTXmnrdyVC+kAqSqGdyiZdne5Pvvjc0lTFmW+l:HxN5GuqsMtlg6yPlMXmnrdMuBGYiZdnr
Static task
static1
Behavioral task
behavioral1
Sample
signed documents and BOL..exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
signed documents and BOL..exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.itresinc.com - Port:
587 - Username:
[email protected] - Password:
MT]ANFjWzKTA - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.itresinc.com - Port:
587 - Username:
[email protected] - Password:
MT]ANFjWzKTA
Targets
-
-
Target
signed documents and BOL..exe
-
Size
713KB
-
MD5
94429681dc767a26304ebe746df41b64
-
SHA1
9003339358b76abd29923035ede75336a22129fb
-
SHA256
1c9d7294c27649d4749a4a3e8c08cdd88fab4e7835cda473a6dde5aca7080a48
-
SHA512
2b1800de7471415f968665120914a80c0bcc46c5b527c63644e39fb15e4099f3f70e8ea36090a99e887efe447fa9e602531da11452dbe52e4ee2d2566fc93acd
-
SSDEEP
12288:HxN5JkuAgIWlMtlgtoyewj5WTXmnrdyVC+kAqSqGdyiZdne5Pvvjc0lTFmW+l:HxN5GuqsMtlg6yPlMXmnrdMuBGYiZdnr
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-