General
-
Target
23RB00427.exe
-
Size
723KB
-
Sample
240514-mm8ptsce54
-
MD5
52302899c3ff8a254c9ca2b457814ec8
-
SHA1
be731db71708b58d1e24f304793bbe760a0260b0
-
SHA256
601e86ba6bfe09e8facbc10c988c256a093abeb97cf026f02155e8047de7cdc3
-
SHA512
e714da5c065ecab9dcd46e86aee86d36f0ca9a5985704c0056e7dcf21145cde8a04856c65ad072d0870167bc58e0fba379c675a26432d4eaa3222d252f99a9e7
-
SSDEEP
12288:oE2AUYMjhvPie/rByY7777777777777NbTlrKet5bmtTJOVi4FkjLkz/1AOcqKpQ:oE2AUYMFniyy41rKYBmtVOYLeA8dR1Jf
Static task
static1
Behavioral task
behavioral1
Sample
23RB00427.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23RB00427.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pari.or.id - Port:
587 - Username:
[email protected] - Password:
parpus1519 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.pari.or.id - Port:
587 - Username:
[email protected] - Password:
parpus1519
Targets
-
-
Target
23RB00427.exe
-
Size
723KB
-
MD5
52302899c3ff8a254c9ca2b457814ec8
-
SHA1
be731db71708b58d1e24f304793bbe760a0260b0
-
SHA256
601e86ba6bfe09e8facbc10c988c256a093abeb97cf026f02155e8047de7cdc3
-
SHA512
e714da5c065ecab9dcd46e86aee86d36f0ca9a5985704c0056e7dcf21145cde8a04856c65ad072d0870167bc58e0fba379c675a26432d4eaa3222d252f99a9e7
-
SSDEEP
12288:oE2AUYMjhvPie/rByY7777777777777NbTlrKet5bmtTJOVi4FkjLkz/1AOcqKpQ:oE2AUYMFniyy41rKYBmtVOYLeA8dR1Jf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-