General
-
Target
1bbbe0b213b7e7b2f33f6f93c0cf12cbc3cc95a1cf9d112e43beb1546df4a572
-
Size
809KB
-
Sample
240530-bkpcmaha3z
-
MD5
fd318febd4f80a34ed3cbb87271b0e8d
-
SHA1
8754a897d54249b810468ca395b801c21e140d93
-
SHA256
1bbbe0b213b7e7b2f33f6f93c0cf12cbc3cc95a1cf9d112e43beb1546df4a572
-
SHA512
42b3a18f51f5ad278225b14c72fde99e7d890b17c918419b24590d9ae1281cc29c9d4e0e041a40bc888c74de9c33de9723ab10f9f0b081cb7a18aaa485bf9d19
-
SSDEEP
12288:UjADhreCPb6Al2sNSj6c1WQK0DvFHPBVcCouW1md7CbAyNJbH7o:UjADhreCPc2YDv57ctbAyNN7o
Static task
static1
Behavioral task
behavioral1
Sample
1bbbe0b213b7e7b2f33f6f93c0cf12cbc3cc95a1cf9d112e43beb1546df4a572.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1bbbe0b213b7e7b2f33f6f93c0cf12cbc3cc95a1cf9d112e43beb1546df4a572.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.avtorska.com.mk - Port:
587 - Username:
[email protected] - Password:
avtorska2014@
Extracted
agenttesla
Protocol: smtp- Host:
mail.avtorska.com.mk - Port:
587 - Username:
[email protected] - Password:
avtorska2014@ - Email To:
[email protected]
Targets
-
-
Target
1bbbe0b213b7e7b2f33f6f93c0cf12cbc3cc95a1cf9d112e43beb1546df4a572
-
Size
809KB
-
MD5
fd318febd4f80a34ed3cbb87271b0e8d
-
SHA1
8754a897d54249b810468ca395b801c21e140d93
-
SHA256
1bbbe0b213b7e7b2f33f6f93c0cf12cbc3cc95a1cf9d112e43beb1546df4a572
-
SHA512
42b3a18f51f5ad278225b14c72fde99e7d890b17c918419b24590d9ae1281cc29c9d4e0e041a40bc888c74de9c33de9723ab10f9f0b081cb7a18aaa485bf9d19
-
SSDEEP
12288:UjADhreCPb6Al2sNSj6c1WQK0DvFHPBVcCouW1md7CbAyNJbH7o:UjADhreCPc2YDv57ctbAyNN7o
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-