General
-
Target
hWGmo6jkdpaDPck1Dqlc-unEpHUudi0ROGToKn22GEM.bin
-
Size
206KB
-
Sample
240509-ltmkhabe9t
-
MD5
7e1756e4f631933c99b3e5f3531f96dd
-
SHA1
387ae8586a6cb120df63cf881c2136eb7930c8e5
-
SHA256
8561a6a3a8e47696833dc9350ea95cfee9c4a4752e762d113864e82a7db61843
-
SHA512
429faec44bc1879674092b1a779c0270d723742e535de43597644b1290ac19b78ea5191e279a4418b1233a978d8dff7f4b318bf292f7977e8e5aebde9e356582
-
SSDEEP
3072:g7gNnCDDRvLGprOAOkGt6+duWA/t/SHUebbxCbGgKk12qk/FPYm21KLbDoUssNXX:uEstvLGcxLbMUMK28H
Static task
static1
Behavioral task
behavioral1
Sample
hWGmo6jkdpaDPck1Dqlc-unEpHUudi0ROGToKn22GEM.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
hWGmo6jkdpaDPck1Dqlc-unEpHUudi0ROGToKn22GEM.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
LYGKMOPuBVzZ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
LYGKMOPuBVzZ
Targets
-
-
Target
hWGmo6jkdpaDPck1Dqlc-unEpHUudi0ROGToKn22GEM.bin
-
Size
206KB
-
MD5
7e1756e4f631933c99b3e5f3531f96dd
-
SHA1
387ae8586a6cb120df63cf881c2136eb7930c8e5
-
SHA256
8561a6a3a8e47696833dc9350ea95cfee9c4a4752e762d113864e82a7db61843
-
SHA512
429faec44bc1879674092b1a779c0270d723742e535de43597644b1290ac19b78ea5191e279a4418b1233a978d8dff7f4b318bf292f7977e8e5aebde9e356582
-
SSDEEP
3072:g7gNnCDDRvLGprOAOkGt6+duWA/t/SHUebbxCbGgKk12qk/FPYm21KLbDoUssNXX:uEstvLGcxLbMUMK28H
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-