General
-
Target
4df5664d100141701b1dc83bd04dbf55233f5a5e8ae9a243f892da225d310e43.exe
-
Size
2.2MB
-
Sample
240505-yf88kabh8w
-
MD5
221bf8e90cf25e7e31a866ab1bc928bb
-
SHA1
4e8d627a94ed76d4b9d1ea285fbccc71d5c08af5
-
SHA256
4df5664d100141701b1dc83bd04dbf55233f5a5e8ae9a243f892da225d310e43
-
SHA512
725d532396eafeb349707f8a6dc4d0c47b752018ee82b3df6d4a51b4f46f7f1d1d018f5cfa2b78ea7d0b875d80b94f0ac74599f013cf1b8d11d2257d1e0cb795
-
SSDEEP
49152:h3J5Uw2r7T6z+WH4EDm7bEbnitl9pdZU+SwQQYQmBP:H5Uwyiz+WHgPE78XdG+S5
Static task
static1
Behavioral task
behavioral1
Sample
4df5664d100141701b1dc83bd04dbf55233f5a5e8ae9a243f892da225d310e43.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sturmsgroup.com - Port:
587 - Username:
[email protected] - Password:
y[/wk46uE}y(|Xn[ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.sturmsgroup.com - Port:
587 - Username:
[email protected] - Password:
y[/wk46uE}y(|Xn[
Targets
-
-
Target
4df5664d100141701b1dc83bd04dbf55233f5a5e8ae9a243f892da225d310e43.exe
-
Size
2.2MB
-
MD5
221bf8e90cf25e7e31a866ab1bc928bb
-
SHA1
4e8d627a94ed76d4b9d1ea285fbccc71d5c08af5
-
SHA256
4df5664d100141701b1dc83bd04dbf55233f5a5e8ae9a243f892da225d310e43
-
SHA512
725d532396eafeb349707f8a6dc4d0c47b752018ee82b3df6d4a51b4f46f7f1d1d018f5cfa2b78ea7d0b875d80b94f0ac74599f013cf1b8d11d2257d1e0cb795
-
SSDEEP
49152:h3J5Uw2r7T6z+WH4EDm7bEbnitl9pdZU+SwQQYQmBP:H5Uwyiz+WHgPE78XdG+S5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-