General
-
Target
ba7541211cc1c286dcdd1dfce89c9ed1827544bffcba2263270e461a45b00b2c
-
Size
246KB
-
Sample
240517-btw4tsbb46
-
MD5
bfb8a979efec55c75d1530702239d741
-
SHA1
03d5f2fba57dd1b1507a16221aaf003fa0d548d4
-
SHA256
ba7541211cc1c286dcdd1dfce89c9ed1827544bffcba2263270e461a45b00b2c
-
SHA512
591d7955eef3fd0e0d6642f531c6afa54df50a051b3cf232d225c69d9f1d4fce786e269da1a627a9e1a0b913a6c9579cba4be77f18b54241185d6e9d03954c75
-
SSDEEP
3072:hy5n5JJJpurL4s5xMq6m62QUnW/2OuRx9g58j05OAix08SOXL:hyV5JJJp6L4s5uqU2zFOuu58jEim8
Behavioral task
behavioral1
Sample
ba7541211cc1c286dcdd1dfce89c9ed1827544bffcba2263270e461a45b00b2c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ba7541211cc1c286dcdd1dfce89c9ed1827544bffcba2263270e461a45b00b2c.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.zoho.com - Port:
587 - Username:
[email protected] - Password:
IDMzp2Gy8uh9 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.zoho.com - Port:
587 - Username:
[email protected] - Password:
IDMzp2Gy8uh9
Targets
-
-
Target
ba7541211cc1c286dcdd1dfce89c9ed1827544bffcba2263270e461a45b00b2c
-
Size
246KB
-
MD5
bfb8a979efec55c75d1530702239d741
-
SHA1
03d5f2fba57dd1b1507a16221aaf003fa0d548d4
-
SHA256
ba7541211cc1c286dcdd1dfce89c9ed1827544bffcba2263270e461a45b00b2c
-
SHA512
591d7955eef3fd0e0d6642f531c6afa54df50a051b3cf232d225c69d9f1d4fce786e269da1a627a9e1a0b913a6c9579cba4be77f18b54241185d6e9d03954c75
-
SSDEEP
3072:hy5n5JJJpurL4s5xMq6m62QUnW/2OuRx9g58j05OAix08SOXL:hyV5JJJp6L4s5uqU2zFOuu58jEim8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-