General
-
Target
14052024_0327_13052024_PO#00017718746.rar
-
Size
665KB
-
Sample
240514-dz6assha6y
-
MD5
2e845da60a32a7390e28a6a72f4436f0
-
SHA1
efbdf4f85915db638926fdbe7ba5df3bc2199e05
-
SHA256
bbf008fb3d6b65ba03a5db2a3702b2c92f26bab155a974187a726937c94e8441
-
SHA512
c013a54d5381f3421281cf4b85461a5ad649df06541880331890d76e98162dbc0ba800dfce735ad4c610433461d87e872929c7614d1f7bae3e4619d9d421bc0d
-
SSDEEP
12288:7sfLagWRhj1t1qkY9DGPUhw6TpJdaZ+6KU8FE9LfMnIPt7LGczBM:czYR169G4jJYLUnc7yc1M
Static task
static1
Behavioral task
behavioral1
Sample
PO#00017718746.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
PO#00017718746.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.ipr-co.org - Port:
587 - Username:
[email protected] - Password:
IPRco@100102@
Extracted
agenttesla
Protocol: smtp- Host:
mail.ipr-co.org - Port:
587 - Username:
[email protected] - Password:
IPRco@100102@ - Email To:
[email protected]
Targets
-
-
Target
PO#00017718746.exe
-
Size
693KB
-
MD5
f9f82e7babe96065c5ed86bd1371ada0
-
SHA1
986809e4ac03ad557cb8750833a5f67dd6dd85ef
-
SHA256
969e6fc312f5e2692d06597171835d6d5b0e514b958ce16dd402f78a5d0aff04
-
SHA512
72a76cd0fcfd680f3d84f07f8c8882f69c317da171569cb51eadcc01c52c41c8a94fdf4edd03b36fc62058e217d7e2426812b04afb7f97b3b56dc0c8d21d941c
-
SSDEEP
12288:uguTeH81jJUdH9qu0nLRT/DDsVg2XXMDJgCamz4JuVTUZhtcFwq1blOzVO7tztg:98MdHcuXXeJgzqTChtcFD4pO7txg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-