General
-
Target
2366fa6196ec89d13d1110556f4df6044587fdc8ad967c9bf572597c64e601ed
-
Size
2.2MB
-
Sample
240524-j5ctbsah82
-
MD5
b3b0c4c4d8844d0659a8c0bb30efebdb
-
SHA1
4b34053559dbe7eb15ea452e2d2827f278c7b77f
-
SHA256
2366fa6196ec89d13d1110556f4df6044587fdc8ad967c9bf572597c64e601ed
-
SHA512
189f2af7e8d566f3e336907f4ddd11f96e347f5d4df3a02fac222e11d91179d5f80106f0f45ab6cc3e7e120bf15857fdd67d383a5006f0e2ac5e9ab8d0c75f4a
-
SSDEEP
49152:tIINGGT7Csd3t7o9SsLENRk85o0FeQApF3kumzw:JDd3mUC85FJ6FJf
Static task
static1
Behavioral task
behavioral1
Sample
2366fa6196ec89d13d1110556f4df6044587fdc8ad967c9bf572597c64e601ed.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2366fa6196ec89d13d1110556f4df6044587fdc8ad967c9bf572597c64e601ed.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gencoldfire.com - Port:
587 - Username:
[email protected] - Password:
U+&%W@y1mSEUOinP - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.gencoldfire.com - Port:
587 - Username:
[email protected] - Password:
U+&%W@y1mSEUOinP
Targets
-
-
Target
2366fa6196ec89d13d1110556f4df6044587fdc8ad967c9bf572597c64e601ed
-
Size
2.2MB
-
MD5
b3b0c4c4d8844d0659a8c0bb30efebdb
-
SHA1
4b34053559dbe7eb15ea452e2d2827f278c7b77f
-
SHA256
2366fa6196ec89d13d1110556f4df6044587fdc8ad967c9bf572597c64e601ed
-
SHA512
189f2af7e8d566f3e336907f4ddd11f96e347f5d4df3a02fac222e11d91179d5f80106f0f45ab6cc3e7e120bf15857fdd67d383a5006f0e2ac5e9ab8d0c75f4a
-
SSDEEP
49152:tIINGGT7Csd3t7o9SsLENRk85o0FeQApF3kumzw:JDd3mUC85FJ6FJf
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-