General
-
Target
7c1ceae7d8b4328c35fbdc82116be59ac77d89370b2b0db855e78a79d2d6bed5
-
Size
538KB
-
Sample
240508-jh8bqacc98
-
MD5
a0571911e8977fb94b93b2f0deb45137
-
SHA1
fce8528ee324b7adb81b73ed909ec1c5e33794ad
-
SHA256
7c1ceae7d8b4328c35fbdc82116be59ac77d89370b2b0db855e78a79d2d6bed5
-
SHA512
9a8d21d775b38e91921f0beb8db3a7c97b89b376be51a2d557fab7c898b5448de92838462cba4776196f76aeed5b0091cc8ea21bb231a420c8804aae3813166e
-
SSDEEP
12288:Wn0AAXRPZuw2l8orxdBv0kdgkSZF8ZF/+PS3Dasb6j8l1PBK:JAAb2Bik2tZFuM63D5WjqI
Static task
static1
Behavioral task
behavioral1
Sample
7c1ceae7d8b4328c35fbdc82116be59ac77d89370b2b0db855e78a79d2d6bed5.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
7c1ceae7d8b4328c35fbdc82116be59ac77d89370b2b0db855e78a79d2d6bed5.exe
Resource
win11-20240419-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
qwbf ljzv fdna xpfx
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
qwbf ljzv fdna xpfx - Email To:
[email protected]
Targets
-
-
Target
7c1ceae7d8b4328c35fbdc82116be59ac77d89370b2b0db855e78a79d2d6bed5
-
Size
538KB
-
MD5
a0571911e8977fb94b93b2f0deb45137
-
SHA1
fce8528ee324b7adb81b73ed909ec1c5e33794ad
-
SHA256
7c1ceae7d8b4328c35fbdc82116be59ac77d89370b2b0db855e78a79d2d6bed5
-
SHA512
9a8d21d775b38e91921f0beb8db3a7c97b89b376be51a2d557fab7c898b5448de92838462cba4776196f76aeed5b0091cc8ea21bb231a420c8804aae3813166e
-
SSDEEP
12288:Wn0AAXRPZuw2l8orxdBv0kdgkSZF8ZF/+PS3Dasb6j8l1PBK:JAAb2Bik2tZFuM63D5WjqI
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-