General
-
Target
8048e53dd3e484c96e5f586ab9e4152a173364144ad9a50baa050222f61d3a9e.exe
-
Size
722KB
-
Sample
240523-b37a6ahc29
-
MD5
b4d30842f7791c314b5793b467e2e40c
-
SHA1
4fd12e0aa4c9843ff3b42aaf3c2efccb94d76124
-
SHA256
8048e53dd3e484c96e5f586ab9e4152a173364144ad9a50baa050222f61d3a9e
-
SHA512
3a3ff969fafcc390654e02ef1bb37687dd797fdcb96a9574e5d1e5166b548b75569bcbc2ef4fb78d784c1b0dd987c2e79988e17bc09d636952143dc047444c4e
-
SSDEEP
12288:+jv732EXsNCjClPiCrybSHcPw+DN53qPIfm6JIqQXElHnsKptYP9ciE8b7PXVj:qb2w6la4fAiPI+6CElHntfYPaiE8b7tj
Static task
static1
Behavioral task
behavioral1
Sample
8048e53dd3e484c96e5f586ab9e4152a173364144ad9a50baa050222f61d3a9e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8048e53dd3e484c96e5f586ab9e4152a173364144ad9a50baa050222f61d3a9e.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.hsbv1.nl - Port:
587 - Username:
[email protected] - Password:
xdDPyH(8 - Email To:
[email protected]
Targets
-
-
Target
8048e53dd3e484c96e5f586ab9e4152a173364144ad9a50baa050222f61d3a9e.exe
-
Size
722KB
-
MD5
b4d30842f7791c314b5793b467e2e40c
-
SHA1
4fd12e0aa4c9843ff3b42aaf3c2efccb94d76124
-
SHA256
8048e53dd3e484c96e5f586ab9e4152a173364144ad9a50baa050222f61d3a9e
-
SHA512
3a3ff969fafcc390654e02ef1bb37687dd797fdcb96a9574e5d1e5166b548b75569bcbc2ef4fb78d784c1b0dd987c2e79988e17bc09d636952143dc047444c4e
-
SSDEEP
12288:+jv732EXsNCjClPiCrybSHcPw+DN53qPIfm6JIqQXElHnsKptYP9ciE8b7PXVj:qb2w6la4fAiPI+6CElHntfYPaiE8b7tj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-