General
-
Target
32a74621bc5e7f294d703b3ef8d13cb0e552088dde8eb5015d0449173aca84e5
-
Size
603KB
-
Sample
240504-byvrkacg78
-
MD5
6cbe02ab27f19b4559e2ecddc727892f
-
SHA1
0e14dca5173f576153b7eb2210290b04eb5b0e71
-
SHA256
32a74621bc5e7f294d703b3ef8d13cb0e552088dde8eb5015d0449173aca84e5
-
SHA512
e7b1c28f6b19d4f6eb44987831729a2933c1a4c4770748101a8e80fdef9faf796b6ecabbf7b368a0519e0ff0c2aeaf5c64ded014d3d75909cbddad5f1071c520
-
SSDEEP
6144:f0qOKo7QnpHAAn8TLATjcH6fp8Lw7ukGjyqn86xlTmMFop8ab:MT7QnhAbTMT4Ep8LwJq89aop3b
Static task
static1
Behavioral task
behavioral1
Sample
32a74621bc5e7f294d703b3ef8d13cb0e552088dde8eb5015d0449173aca84e5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
32a74621bc5e7f294d703b3ef8d13cb0e552088dde8eb5015d0449173aca84e5.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
business29.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
Esupofo234@ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
business29.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
Esupofo234@
Targets
-
-
Target
32a74621bc5e7f294d703b3ef8d13cb0e552088dde8eb5015d0449173aca84e5
-
Size
603KB
-
MD5
6cbe02ab27f19b4559e2ecddc727892f
-
SHA1
0e14dca5173f576153b7eb2210290b04eb5b0e71
-
SHA256
32a74621bc5e7f294d703b3ef8d13cb0e552088dde8eb5015d0449173aca84e5
-
SHA512
e7b1c28f6b19d4f6eb44987831729a2933c1a4c4770748101a8e80fdef9faf796b6ecabbf7b368a0519e0ff0c2aeaf5c64ded014d3d75909cbddad5f1071c520
-
SSDEEP
6144:f0qOKo7QnpHAAn8TLATjcH6fp8Lw7ukGjyqn86xlTmMFop8ab:MT7QnhAbTMT4Ep8LwJq89aop3b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-