General
-
Target
ac4a2e0fd83f735178b92fa4123b64887564a55996c85c9e9bf62c7c94f78fc1
-
Size
1013KB
-
Sample
240523-b4d11aha51
-
MD5
ba915559642dd97f19eecb3d6077831b
-
SHA1
aac44d917caf2e6d5271c7359285b56162161c76
-
SHA256
ac4a2e0fd83f735178b92fa4123b64887564a55996c85c9e9bf62c7c94f78fc1
-
SHA512
c7ee47ba8a66cb485ed1e218379fd7cbb5e11391743b1e74eeda2719d8a624a95c4c430cc9b2b114ad3f70621556d121bfb34e8abe7e9ddf0ff05d85bc2588b3
-
SSDEEP
24576:1AHnh+eWsN3skA4RV1Hom2KXMmHaMGG3mBH3tEo/Fc5:kh+ZkldoPK8YaMGRBH3Go8
Static task
static1
Behavioral task
behavioral1
Sample
ac4a2e0fd83f735178b92fa4123b64887564a55996c85c9e9bf62c7c94f78fc1.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ac4a2e0fd83f735178b92fa4123b64887564a55996c85c9e9bf62c7c94f78fc1.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
s30.securelayernetwork.com - Port:
587 - Username:
[email protected] - Password:
%lmb-a,[(1ty - Email To:
[email protected]
Targets
-
-
Target
ac4a2e0fd83f735178b92fa4123b64887564a55996c85c9e9bf62c7c94f78fc1
-
Size
1013KB
-
MD5
ba915559642dd97f19eecb3d6077831b
-
SHA1
aac44d917caf2e6d5271c7359285b56162161c76
-
SHA256
ac4a2e0fd83f735178b92fa4123b64887564a55996c85c9e9bf62c7c94f78fc1
-
SHA512
c7ee47ba8a66cb485ed1e218379fd7cbb5e11391743b1e74eeda2719d8a624a95c4c430cc9b2b114ad3f70621556d121bfb34e8abe7e9ddf0ff05d85bc2588b3
-
SSDEEP
24576:1AHnh+eWsN3skA4RV1Hom2KXMmHaMGG3mBH3tEo/Fc5:kh+ZkldoPK8YaMGRBH3Go8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-