General
-
Target
tmp6x00xzqq
-
Size
701KB
-
Sample
240523-zjq2tsfg46
-
MD5
cd46396fa20831c4ec0acea6534d020f
-
SHA1
1736c61d635cc61d8e9ec6b0dd15ddf814657fc5
-
SHA256
c90f02f4c4f58772131c5fc1b8cc8acc647005189e1abd87ecae379a41b0eac8
-
SHA512
b40e2fe2faab4a4faf3c6e82cd778868fb275e41b55f40a6f566eecab23aac42e0956b261b124c47849bcc8d6a4809192c5ec21e301d8d513b9391571b7cdc91
-
SSDEEP
12288:Cvp1DrAkngRmfxs7ZsGYAG5utPHH9oTHhwOR6bu:enDrA/mfWZsGY7+0ho
Static task
static1
Behavioral task
behavioral1
Sample
tmp6x00xzqq.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp6x00xzqq.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.lumies.co.za - Port:
587 - Username:
[email protected] - Password:
vj$)KFsCyFOr - Email To:
[email protected]
Targets
-
-
Target
tmp6x00xzqq
-
Size
701KB
-
MD5
cd46396fa20831c4ec0acea6534d020f
-
SHA1
1736c61d635cc61d8e9ec6b0dd15ddf814657fc5
-
SHA256
c90f02f4c4f58772131c5fc1b8cc8acc647005189e1abd87ecae379a41b0eac8
-
SHA512
b40e2fe2faab4a4faf3c6e82cd778868fb275e41b55f40a6f566eecab23aac42e0956b261b124c47849bcc8d6a4809192c5ec21e301d8d513b9391571b7cdc91
-
SSDEEP
12288:Cvp1DrAkngRmfxs7ZsGYAG5utPHH9oTHhwOR6bu:enDrA/mfWZsGY7+0ho
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
0ff2d70cfdc8095ea99ca2dabbec3cd7
-
SHA1
10c51496d37cecd0e8a503a5a9bb2329d9b38116
-
SHA256
982c5fb7ada7d8c9bc3e419d1c35da6f05bc5dd845940c179af3a33d00a36a8b
-
SHA512
cb5fc0b3194f469b833c2c9abf493fcec5251e8609881b7f5e095b9bd09ed468168e95dda0ba415a7d8d6b7f0dee735467c0ed8e52b223eb5359986891ba6e2e
-
SSDEEP
192:eK24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlASl:u8QIl975eXqlWBrz7YLOlA
Score3/10 -
-
-
Target
$PLUGINSDIR/nsExec.dll
-
Size
6KB
-
MD5
01e76fe9d2033606a48d4816bd9c2d9d
-
SHA1
e46d8a9ed4d5da220c81baf5f1fdb94708e9aba2
-
SHA256
ee052fd5141bf769b841846170aabf0d7c2bb922c74c623c3f109344534f7a70
-
SHA512
62ef7095d1bf53354c20329c2ce8546c277aa0e791839c8a24108a01f9483a953979259e0ad04dbcab966444ee7cdd340f8c9557bc8f98e9400794f2751dc7e0
-
SSDEEP
96:J7fhfKaGgchPzxK6bq+pKX6D8ZLidGgmkN738:HbGgGPzxeX6D8ZyGgmkN
Score3/10 -