General
-
Target
089beca6b799a599fe001714701e19c582976127a80b299227a802d9792ace66.exe
-
Size
496KB
-
Sample
240511-kfszpahb6v
-
MD5
374638fabd306bc41927b30c137be952
-
SHA1
fe8615fb8bbed262482d7603f2fec9aaaaf74863
-
SHA256
089beca6b799a599fe001714701e19c582976127a80b299227a802d9792ace66
-
SHA512
b5afbd0e4eccc5ae622f53ae48efaa6bce8f9654023498cbec967ef93edc1aa45f6ab48f0dfd2bc096a2950b0192128406ffa0b7d67411881df3a3208ff140a0
-
SSDEEP
3072:DZVQR2tdg79x/UbUOTxgvyw5yjxh4H444lX:FVBt+sgiQxaf4H444l
Static task
static1
Behavioral task
behavioral1
Sample
089beca6b799a599fe001714701e19c582976127a80b299227a802d9792ace66.exe
Resource
win7-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
PDMgpFaraDAY%@@ - Email To:
[email protected]
Targets
-
-
Target
089beca6b799a599fe001714701e19c582976127a80b299227a802d9792ace66.exe
-
Size
496KB
-
MD5
374638fabd306bc41927b30c137be952
-
SHA1
fe8615fb8bbed262482d7603f2fec9aaaaf74863
-
SHA256
089beca6b799a599fe001714701e19c582976127a80b299227a802d9792ace66
-
SHA512
b5afbd0e4eccc5ae622f53ae48efaa6bce8f9654023498cbec967ef93edc1aa45f6ab48f0dfd2bc096a2950b0192128406ffa0b7d67411881df3a3208ff140a0
-
SSDEEP
3072:DZVQR2tdg79x/UbUOTxgvyw5yjxh4H444lX:FVBt+sgiQxaf4H444l
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-