General
-
Target
NEW PO10124.exe
-
Size
690KB
-
Sample
240515-kjp27shd99
-
MD5
ef33c35be9b375935186e69866e52739
-
SHA1
a960303e27edecdb25a32af0051f8a1b5c8c47df
-
SHA256
77ca4ee4e11265fae0cb39bd6ebbaca1e771411098fdd5c11a4ad6eb73b1a85c
-
SHA512
96ddc46e1dba575e457ac8524a83560146ef6902a6e6ffb8b812b0a8dd0e027c56ae775523091c8db04a31fd1119e33e2a293a14380a063cfd44c3304c15fd81
-
SSDEEP
12288:5fJP21680skSKSIwCvJPFUuK6tTWTRWKmMf8PrdDMxSECstg34nf+H78DySuqMEN:j+1680JSNIHHw6taTwtPRMxdf+bGRMEN
Static task
static1
Behavioral task
behavioral1
Sample
NEW PO10124.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
NEW PO10124.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.policymartinsurance.com - Port:
587 - Username:
[email protected] - Password:
Kwal4952@ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.policymartinsurance.com - Port:
587 - Username:
[email protected] - Password:
Kwal4952@
Targets
-
-
Target
NEW PO10124.exe
-
Size
690KB
-
MD5
ef33c35be9b375935186e69866e52739
-
SHA1
a960303e27edecdb25a32af0051f8a1b5c8c47df
-
SHA256
77ca4ee4e11265fae0cb39bd6ebbaca1e771411098fdd5c11a4ad6eb73b1a85c
-
SHA512
96ddc46e1dba575e457ac8524a83560146ef6902a6e6ffb8b812b0a8dd0e027c56ae775523091c8db04a31fd1119e33e2a293a14380a063cfd44c3304c15fd81
-
SSDEEP
12288:5fJP21680skSKSIwCvJPFUuK6tTWTRWKmMf8PrdDMxSECstg34nf+H78DySuqMEN:j+1680JSNIHHw6taTwtPRMxdf+bGRMEN
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-