General
-
Target
ME1241562024.exe
-
Size
770KB
-
Sample
240529-f7514sca5s
-
MD5
9b677b4d8e87552558cb7b250c4dd3ca
-
SHA1
705dfbf6f6d34b10f9265d8334439de636b1e8c7
-
SHA256
970134c0517367f08aac89e19cf63ac667fe75db4b86616209ee858737a1cd79
-
SHA512
f90c313de9ec11b785e8ac6d3950cd04a3e3174b1dd1abfa8133bc6079545d0e78ab67e49908b80e44e02053ad7b28e9d18f2dfba38d7468859b5735e1ddb051
-
SSDEEP
24576:/auvE6ITmd3x50xGRayTwng3Tgx44Nlj:xtIm0GZT0g3TgXj
Static task
static1
Behavioral task
behavioral1
Sample
ME1241562024.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ME1241562024.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.officeemailbackup.com - Port:
587 - Username:
[email protected] - Password:
d1IXFo$=lK[r - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.officeemailbackup.com - Port:
587 - Username:
[email protected] - Password:
d1IXFo$=lK[r
Targets
-
-
Target
ME1241562024.exe
-
Size
770KB
-
MD5
9b677b4d8e87552558cb7b250c4dd3ca
-
SHA1
705dfbf6f6d34b10f9265d8334439de636b1e8c7
-
SHA256
970134c0517367f08aac89e19cf63ac667fe75db4b86616209ee858737a1cd79
-
SHA512
f90c313de9ec11b785e8ac6d3950cd04a3e3174b1dd1abfa8133bc6079545d0e78ab67e49908b80e44e02053ad7b28e9d18f2dfba38d7468859b5735e1ddb051
-
SSDEEP
24576:/auvE6ITmd3x50xGRayTwng3Tgx44Nlj:xtIm0GZT0g3TgXj
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-