General
-
Target
3456ce5ab5be06335595356e6a0b3518a05386d3d695b2f13a698d784b1b1508.exe
-
Size
2.3MB
-
Sample
240509-l2tzjseg92
-
MD5
b38c001c6f174c3d81cc87322104d793
-
SHA1
07277a0d8612e3987ae1ed5da82bf9156c025c05
-
SHA256
3456ce5ab5be06335595356e6a0b3518a05386d3d695b2f13a698d784b1b1508
-
SHA512
7a36abee6d9591b5ee17e014beaf25741677feb43c1e523464b7e83618e11ba5864c6cc6a2f518631335b2609763f5e03cd6c1564291fbd31ca6f33b6a8b08df
-
SSDEEP
49152:LX571nV4oGQ2Pl1VA7jfqCaPmGO1gDAUK25tuqquCjhaN6rluHX8:l71+bQ2Plfcw+qDj3nhCjY1X8
Static task
static1
Behavioral task
behavioral1
Sample
3456ce5ab5be06335595356e6a0b3518a05386d3d695b2f13a698d784b1b1508.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3456ce5ab5be06335595356e6a0b3518a05386d3d695b2f13a698d784b1b1508.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.id-net.fr - Port:
587 - Username:
[email protected] - Password:
zhi33 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.id-net.fr - Port:
587 - Username:
[email protected] - Password:
zhi33
Targets
-
-
Target
3456ce5ab5be06335595356e6a0b3518a05386d3d695b2f13a698d784b1b1508.exe
-
Size
2.3MB
-
MD5
b38c001c6f174c3d81cc87322104d793
-
SHA1
07277a0d8612e3987ae1ed5da82bf9156c025c05
-
SHA256
3456ce5ab5be06335595356e6a0b3518a05386d3d695b2f13a698d784b1b1508
-
SHA512
7a36abee6d9591b5ee17e014beaf25741677feb43c1e523464b7e83618e11ba5864c6cc6a2f518631335b2609763f5e03cd6c1564291fbd31ca6f33b6a8b08df
-
SSDEEP
49152:LX571nV4oGQ2Pl1VA7jfqCaPmGO1gDAUK25tuqquCjhaN6rluHX8:l71+bQ2Plfcw+qDj3nhCjY1X8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-