General
-
Target
59517d5dc856f7d0121c94235e08d56bc13524436d6bedd9f3b1caf37ec67320
-
Size
674KB
-
Sample
240523-ch4j7shh2w
-
MD5
dc91f4b8d1df6d3ce7641c5c36e4978e
-
SHA1
2e14bbf9db4b8cc7d6e25bcfa9c695907f6d0113
-
SHA256
59517d5dc856f7d0121c94235e08d56bc13524436d6bedd9f3b1caf37ec67320
-
SHA512
bf81c7e212a50a69af3bd4c1b7f4b9771436b18fd18f0958407d6a08b71cf91617523680a2b98adc256a9d412c7df09aaa33c86a5c9ec40d844920f6e6ebb8bb
-
SSDEEP
12288:MSjDNl0duAnix0g8lFDFK6jjg5+nAuIWxGHrSh:l6duz8n3g5+AuIWxY
Static task
static1
Behavioral task
behavioral1
Sample
59517d5dc856f7d0121c94235e08d56bc13524436d6bedd9f3b1caf37ec67320.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
59517d5dc856f7d0121c94235e08d56bc13524436d6bedd9f3b1caf37ec67320.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cash4cars.nz - Port:
587 - Username:
[email protected] - Password:
logs2024! - Email To:
[email protected]
Targets
-
-
Target
59517d5dc856f7d0121c94235e08d56bc13524436d6bedd9f3b1caf37ec67320
-
Size
674KB
-
MD5
dc91f4b8d1df6d3ce7641c5c36e4978e
-
SHA1
2e14bbf9db4b8cc7d6e25bcfa9c695907f6d0113
-
SHA256
59517d5dc856f7d0121c94235e08d56bc13524436d6bedd9f3b1caf37ec67320
-
SHA512
bf81c7e212a50a69af3bd4c1b7f4b9771436b18fd18f0958407d6a08b71cf91617523680a2b98adc256a9d412c7df09aaa33c86a5c9ec40d844920f6e6ebb8bb
-
SSDEEP
12288:MSjDNl0duAnix0g8lFDFK6jjg5+nAuIWxGHrSh:l6duz8n3g5+AuIWxY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-