General
-
Target
69f065a7b13b8067d3eaa613180a3ba2fb2f03c658b6f398209024700d288bf3
-
Size
693KB
-
Sample
240514-jetddsfc7z
-
MD5
96cb932974b4d07cf7d11caef8c1d590
-
SHA1
d75be7456230cf9f0db6e2f8589c11f87918de88
-
SHA256
69f065a7b13b8067d3eaa613180a3ba2fb2f03c658b6f398209024700d288bf3
-
SHA512
c60cccf9eba48dad4563e48ba6017aa3bb5411aecfef413ea74b7cce443e646d26309a93234357a20d85887866de3bc7d07c95e7c1c3be6e1594329c9c0e351f
-
SSDEEP
12288:a5F6HkkoFOuwMx7Qzb9y91thseOFseQoCe1Kls65wf/gLYN+kn:a+Y7QlKhCiet1KS60D
Static task
static1
Behavioral task
behavioral1
Sample
69f065a7b13b8067d3eaa613180a3ba2fb2f03c658b6f398209024700d288bf3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
69f065a7b13b8067d3eaa613180a3ba2fb2f03c658b6f398209024700d288bf3.exe
Resource
win11-20240426-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.magnaprocessing.com - Port:
587 - Username:
[email protected] - Password:
Hookit6278
Extracted
agenttesla
Protocol: smtp- Host:
mail.magnaprocessing.com - Port:
587 - Username:
[email protected] - Password:
Hookit6278 - Email To:
[email protected]
Targets
-
-
Target
69f065a7b13b8067d3eaa613180a3ba2fb2f03c658b6f398209024700d288bf3
-
Size
693KB
-
MD5
96cb932974b4d07cf7d11caef8c1d590
-
SHA1
d75be7456230cf9f0db6e2f8589c11f87918de88
-
SHA256
69f065a7b13b8067d3eaa613180a3ba2fb2f03c658b6f398209024700d288bf3
-
SHA512
c60cccf9eba48dad4563e48ba6017aa3bb5411aecfef413ea74b7cce443e646d26309a93234357a20d85887866de3bc7d07c95e7c1c3be6e1594329c9c0e351f
-
SSDEEP
12288:a5F6HkkoFOuwMx7Qzb9y91thseOFseQoCe1Kls65wf/gLYN+kn:a+Y7QlKhCiet1KS60D
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-