General
-
Target
1b1ed0ca854f22b7075e848d4781bbcec905e5eb65e7df69c8354e2afbf46fd1
-
Size
744KB
-
Sample
240525-g1smwaha9w
-
MD5
eef51809b76c7da0e209722e13ca4cba
-
SHA1
fe00cb9567ef784a9908c6f5fb1752dcaecaf42b
-
SHA256
1b1ed0ca854f22b7075e848d4781bbcec905e5eb65e7df69c8354e2afbf46fd1
-
SHA512
4e08b37accd59293e06aa17d0b8c60b355c21aa357de2edfe757cbc1213ff58df38b2704046932913b9f16aa2a8eaf32dc1baa8bb6738b82a931c790a48a0df3
-
SSDEEP
12288:ZOgRbLx1MCrsXFwUApOl3MuQF0oo3bCvJz3e45D+Ur4DNXBhpaWIP:Z3lA7TSOeuQu2xz3ejUr4hD89
Static task
static1
Behavioral task
behavioral1
Sample
1b1ed0ca854f22b7075e848d4781bbcec905e5eb65e7df69c8354e2afbf46fd1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1b1ed0ca854f22b7075e848d4781bbcec905e5eb65e7df69c8354e2afbf46fd1.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.fasmacopy.gr - Port:
587 - Username:
[email protected] - Password:
Fam28sjd - Email To:
[email protected]
Targets
-
-
Target
1b1ed0ca854f22b7075e848d4781bbcec905e5eb65e7df69c8354e2afbf46fd1
-
Size
744KB
-
MD5
eef51809b76c7da0e209722e13ca4cba
-
SHA1
fe00cb9567ef784a9908c6f5fb1752dcaecaf42b
-
SHA256
1b1ed0ca854f22b7075e848d4781bbcec905e5eb65e7df69c8354e2afbf46fd1
-
SHA512
4e08b37accd59293e06aa17d0b8c60b355c21aa357de2edfe757cbc1213ff58df38b2704046932913b9f16aa2a8eaf32dc1baa8bb6738b82a931c790a48a0df3
-
SSDEEP
12288:ZOgRbLx1MCrsXFwUApOl3MuQF0oo3bCvJz3e45D+Ur4DNXBhpaWIP:Z3lA7TSOeuQu2xz3ejUr4hD89
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-