General
-
Target
Copy100257338PDF.exe
-
Size
205KB
-
Sample
240514-asm9vscc55
-
MD5
696c8e95daafa551715ad53c7c8e632b
-
SHA1
a18559becf0bab5ef3abd66fcbacdecb410bc5fc
-
SHA256
cf5b678a31b81a5c05dd71de8e0764161ad40baf1f931a80e4871cbe79d93c9e
-
SHA512
d701563e43ab7399bfd0b787ec4b241d295f2834e3bafa05360b6bf7a2b0ee8ccbd87d75da511dd8cb84a711018ae3dabd2bffa03c8fa516d86d296e585223ad
-
SSDEEP
3072:3yNnCDDRvLGprOAOkGt6+duWA/t/SHUebbxCbGgKk12qk/FPYm21KLbDoUssNXNS:estvLGcxLbMUMK2JH
Static task
static1
Behavioral task
behavioral1
Sample
Copy100257338PDF.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Copy100257338PDF.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
AvydGQ8TIDH9 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
AvydGQ8TIDH9
Targets
-
-
Target
Copy100257338PDF.exe
-
Size
205KB
-
MD5
696c8e95daafa551715ad53c7c8e632b
-
SHA1
a18559becf0bab5ef3abd66fcbacdecb410bc5fc
-
SHA256
cf5b678a31b81a5c05dd71de8e0764161ad40baf1f931a80e4871cbe79d93c9e
-
SHA512
d701563e43ab7399bfd0b787ec4b241d295f2834e3bafa05360b6bf7a2b0ee8ccbd87d75da511dd8cb84a711018ae3dabd2bffa03c8fa516d86d296e585223ad
-
SSDEEP
3072:3yNnCDDRvLGprOAOkGt6+duWA/t/SHUebbxCbGgKk12qk/FPYm21KLbDoUssNXNS:estvLGcxLbMUMK2JH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-