General
-
Target
192fdb3f81e4e8be51c5fc4d83750e9ef2b3bfb475ccb8fd9748c5d44b23b02b
-
Size
159KB
-
Sample
240526-bqeqdahf4t
-
MD5
891e6580d459d33f0712d9c809986110
-
SHA1
427b121988df97ab92d728252fd32aeeb1483c22
-
SHA256
192fdb3f81e4e8be51c5fc4d83750e9ef2b3bfb475ccb8fd9748c5d44b23b02b
-
SHA512
c3089c868d400b01547a61c4562495f6e535ced69126d0e03b6c1a06ad689db386bd89b3e978f9a2ce244b027547e0bcbcada2c05488063e1fcb50bf664481b1
-
SSDEEP
3072:q8JRV9v0EjCXromEUsLaWb8MNeeojzfzahdyAgg4V753M1:q0R0EGcmEUkazeojzfzahdP1E7
Behavioral task
behavioral1
Sample
192fdb3f81e4e8be51c5fc4d83750e9ef2b3bfb475ccb8fd9748c5d44b23b02b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
192fdb3f81e4e8be51c5fc4d83750e9ef2b3bfb475ccb8fd9748c5d44b23b02b.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.auto-lima.com - Port:
587 - Username:
[email protected] - Password:
FLbenfica2019 - Email To:
[email protected]
Targets
-
-
Target
192fdb3f81e4e8be51c5fc4d83750e9ef2b3bfb475ccb8fd9748c5d44b23b02b
-
Size
159KB
-
MD5
891e6580d459d33f0712d9c809986110
-
SHA1
427b121988df97ab92d728252fd32aeeb1483c22
-
SHA256
192fdb3f81e4e8be51c5fc4d83750e9ef2b3bfb475ccb8fd9748c5d44b23b02b
-
SHA512
c3089c868d400b01547a61c4562495f6e535ced69126d0e03b6c1a06ad689db386bd89b3e978f9a2ce244b027547e0bcbcada2c05488063e1fcb50bf664481b1
-
SSDEEP
3072:q8JRV9v0EjCXromEUsLaWb8MNeeojzfzahdyAgg4V753M1:q0R0EGcmEUkazeojzfzahdP1E7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-