General
-
Target
95bf62b1c5190eff2e210978c870b53bae4685880395fab5c5ee689db96069bf.exe
-
Size
245KB
-
Sample
240509-n3fvesah75
-
MD5
4c0c13426bd7ab1f38832e100ed5e5ac
-
SHA1
d574583e4e3f83048f4f63c8019459f1c0a32677
-
SHA256
95bf62b1c5190eff2e210978c870b53bae4685880395fab5c5ee689db96069bf
-
SHA512
acb489915d3440915d63fb149e5e0ade8722893b4104196ac9a68f8dd865a7795da5d12ed4eee8fdcf6103f09548ff222291fb9630d349cc4d46262edeffdb96
-
SSDEEP
3072:CGxPEOfrvzv3U+iiZ2o6S/u6K/HRthQDK7Wr455fuY5x8:CGxPBfrvzv3U+iE2od/u/jhsK7Wr0uS
Behavioral task
behavioral1
Sample
95bf62b1c5190eff2e210978c870b53bae4685880395fab5c5ee689db96069bf.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
95bf62b1c5190eff2e210978c870b53bae4685880395fab5c5ee689db96069bf.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.2mfs.net - Port:
587 - Username:
[email protected] - Password:
ibile.ibile@123 - Email To:
[email protected]
Targets
-
-
Target
95bf62b1c5190eff2e210978c870b53bae4685880395fab5c5ee689db96069bf.exe
-
Size
245KB
-
MD5
4c0c13426bd7ab1f38832e100ed5e5ac
-
SHA1
d574583e4e3f83048f4f63c8019459f1c0a32677
-
SHA256
95bf62b1c5190eff2e210978c870b53bae4685880395fab5c5ee689db96069bf
-
SHA512
acb489915d3440915d63fb149e5e0ade8722893b4104196ac9a68f8dd865a7795da5d12ed4eee8fdcf6103f09548ff222291fb9630d349cc4d46262edeffdb96
-
SSDEEP
3072:CGxPEOfrvzv3U+iiZ2o6S/u6K/HRthQDK7Wr455fuY5x8:CGxPBfrvzv3U+iE2od/u/jhsK7Wr0uS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-