General
-
Target
Curriculum Vitae Catalina Munoz.exe
-
Size
767KB
-
Sample
240521-p6cgvaef7y
-
MD5
125c45b0537f2cc75190a202f855bfa5
-
SHA1
ce1780060917a828b273379e97297e69a9c9027a
-
SHA256
5434f56ea712cdf3befb3d93d70711cda5d7edd1078eafe735f933f12aaca839
-
SHA512
76046062ed78c8c6010ea213db0c43597d7811511d1b2752975a6934cf02753643de6c444fda3b0bd667e8456e454c1ce7e850391c4ca4ea7006a4028479b3c3
-
SSDEEP
12288:JXWdrLbDZaNRpc4iuWl9zFlhhU6oK/n5h+BvB2kpU5J01xHNDSxza+3AjFj9PDv/:6LDZMRpkl9/hhGUf+ZtpiJIND4Tu
Static task
static1
Behavioral task
behavioral1
Sample
Curriculum Vitae Catalina Munoz.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Curriculum Vitae Catalina Munoz.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.claresbout.com - Port:
587 - Username:
[email protected] - Password:
fahaF^V7 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.claresbout.com - Port:
587 - Username:
[email protected] - Password:
fahaF^V7
Targets
-
-
Target
Curriculum Vitae Catalina Munoz.exe
-
Size
767KB
-
MD5
125c45b0537f2cc75190a202f855bfa5
-
SHA1
ce1780060917a828b273379e97297e69a9c9027a
-
SHA256
5434f56ea712cdf3befb3d93d70711cda5d7edd1078eafe735f933f12aaca839
-
SHA512
76046062ed78c8c6010ea213db0c43597d7811511d1b2752975a6934cf02753643de6c444fda3b0bd667e8456e454c1ce7e850391c4ca4ea7006a4028479b3c3
-
SSDEEP
12288:JXWdrLbDZaNRpc4iuWl9zFlhhU6oK/n5h+BvB2kpU5J01xHNDSxza+3AjFj9PDv/:6LDZMRpkl9/hhGUf+ZtpiJIND4Tu
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-