General
-
Target
a21bd050ce5d1c70967e427e6dae9989864219055efcee8cf26e6fef53418380
-
Size
3.1MB
-
Sample
240522-b8jr2sge36
-
MD5
df87116ac55956ae1aa1e0631d7f9acb
-
SHA1
ea9d517540026b7d54fc020f20ea6865358e274c
-
SHA256
a21bd050ce5d1c70967e427e6dae9989864219055efcee8cf26e6fef53418380
-
SHA512
0f33e9384d9900204ad64156051cdf4dd6eedfa2718055c7b8eec014c266f6ff2b58c97321aeb7a5bab2b5b929c793063c2236416835faea62c5c4d5a540fd2a
-
SSDEEP
98304:C+RtUckkK8wShr8s+gWtcWvP9lLZbEiBWE2uvMRtnu2zt:ZRtj75HWuWvlltHW/Xznu
Static task
static1
Behavioral task
behavioral1
Sample
a21bd050ce5d1c70967e427e6dae9989864219055efcee8cf26e6fef53418380.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
dU*wU0)yR;?4q|-# - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
dU*wU0)yR;?4q|-#
Targets
-
-
Target
a21bd050ce5d1c70967e427e6dae9989864219055efcee8cf26e6fef53418380
-
Size
3.1MB
-
MD5
df87116ac55956ae1aa1e0631d7f9acb
-
SHA1
ea9d517540026b7d54fc020f20ea6865358e274c
-
SHA256
a21bd050ce5d1c70967e427e6dae9989864219055efcee8cf26e6fef53418380
-
SHA512
0f33e9384d9900204ad64156051cdf4dd6eedfa2718055c7b8eec014c266f6ff2b58c97321aeb7a5bab2b5b929c793063c2236416835faea62c5c4d5a540fd2a
-
SSDEEP
98304:C+RtUckkK8wShr8s+gWtcWvP9lLZbEiBWE2uvMRtnu2zt:ZRtj75HWuWvlltHW/Xznu
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-