General
-
Target
783fb85c2b0bd6bb18fe065bd381d5b80a7d82526733c2a04debb95b1196886c
-
Size
2.2MB
-
Sample
240508-bqvftsde64
-
MD5
46f9998e9e92ad9bced8254badc80952
-
SHA1
09a75b57907eb286267c92ead04c8975f5a19bfe
-
SHA256
783fb85c2b0bd6bb18fe065bd381d5b80a7d82526733c2a04debb95b1196886c
-
SHA512
a1bbd03686532e5e0587056f37cbb72e42ef2f4bb35bd88e948986e2f39e0a4794843c345ceacdddc9de988b89b2bcc30605efaf61cdafaa6970c9ffc078fed7
-
SSDEEP
49152:95QUDE+46HxIh+KFydai9zHBNrrGV2w3b0KNkAJDbU4yphY/D3f:Nn/6hlmBzXrrG7NkAJXQc/
Behavioral task
behavioral1
Sample
783fb85c2b0bd6bb18fe065bd381d5b80a7d82526733c2a04debb95b1196886c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
783fb85c2b0bd6bb18fe065bd381d5b80a7d82526733c2a04debb95b1196886c.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
dU*wU0)yR;?4q|-# - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
dU*wU0)yR;?4q|-#
Targets
-
-
Target
783fb85c2b0bd6bb18fe065bd381d5b80a7d82526733c2a04debb95b1196886c
-
Size
2.2MB
-
MD5
46f9998e9e92ad9bced8254badc80952
-
SHA1
09a75b57907eb286267c92ead04c8975f5a19bfe
-
SHA256
783fb85c2b0bd6bb18fe065bd381d5b80a7d82526733c2a04debb95b1196886c
-
SHA512
a1bbd03686532e5e0587056f37cbb72e42ef2f4bb35bd88e948986e2f39e0a4794843c345ceacdddc9de988b89b2bcc30605efaf61cdafaa6970c9ffc078fed7
-
SSDEEP
49152:95QUDE+46HxIh+KFydai9zHBNrrGV2w3b0KNkAJDbU4yphY/D3f:Nn/6hlmBzXrrG7NkAJXQc/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
PureLog Stealer payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-