General
-
Target
ff7fe4adccbf79733798ebd0648ac1eeeae67bd8c9102ce30ad845f80c799c95
-
Size
740KB
-
Sample
240508-bhbzhsac6w
-
MD5
26090850955e5fb4896e091395c5efab
-
SHA1
136a24c124b52bcd122b925bee1a13deea5fba84
-
SHA256
ff7fe4adccbf79733798ebd0648ac1eeeae67bd8c9102ce30ad845f80c799c95
-
SHA512
fa55e45bca00386b970d821388e68467547ad87682f9b3576b1c78acfa4ce6cce0118ce107472deb5ea21fd52ea6ed6fe6fa70b7c2f9a6fac706a358098589f7
-
SSDEEP
12288:wB1oVeonDkhJY4GKC3JZj9BPpe1P5KHliLgU0j/YEwxCB2oE9qZA30R+/wIgrXj1:io5+NeZjReJ4H5HD0xS2oEwZA36Ig3Qi
Static task
static1
Behavioral task
behavioral1
Sample
ff7fe4adccbf79733798ebd0648ac1eeeae67bd8c9102ce30ad845f80c799c95.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff7fe4adccbf79733798ebd0648ac1eeeae67bd8c9102ce30ad845f80c799c95.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.grupodeltron.com - Port:
587 - Username:
[email protected] - Password:
#XZAy-NG^s0r - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.grupodeltron.com - Port:
587 - Username:
[email protected] - Password:
#XZAy-NG^s0r
Targets
-
-
Target
ff7fe4adccbf79733798ebd0648ac1eeeae67bd8c9102ce30ad845f80c799c95
-
Size
740KB
-
MD5
26090850955e5fb4896e091395c5efab
-
SHA1
136a24c124b52bcd122b925bee1a13deea5fba84
-
SHA256
ff7fe4adccbf79733798ebd0648ac1eeeae67bd8c9102ce30ad845f80c799c95
-
SHA512
fa55e45bca00386b970d821388e68467547ad87682f9b3576b1c78acfa4ce6cce0118ce107472deb5ea21fd52ea6ed6fe6fa70b7c2f9a6fac706a358098589f7
-
SSDEEP
12288:wB1oVeonDkhJY4GKC3JZj9BPpe1P5KHliLgU0j/YEwxCB2oE9qZA30R+/wIgrXj1:io5+NeZjReJ4H5HD0xS2oEwZA36Ig3Qi
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-