General
-
Target
ada7a8238c9d285a764c29de13e82cad1a18ce50a5da9a60742b3bc0d0102d9d
-
Size
700KB
-
Sample
240604-by8neshd79
-
MD5
968cf2f6dd1e574fbd7a60cb2fd057f5
-
SHA1
4e6cfcb4e13006a40eabf999d528fbbc3c5b4c82
-
SHA256
ada7a8238c9d285a764c29de13e82cad1a18ce50a5da9a60742b3bc0d0102d9d
-
SHA512
dfd77ec6fa6d11c34ec44d39e05f31f54e853bec6839567b7ec5712d6c645a371b94cbd35e0f92c770af504700a0a7677075b5294d75db938ed44d87c32ca49a
-
SSDEEP
12288:YEkKt/rFfaJsKSwwg8iUu+XDzFlOr3KQkmgUNscv8j33skCrRk0:9kKN5iJJbwg83lI3jv9sca3RC1k
Static task
static1
Behavioral task
behavioral1
Sample
ada7a8238c9d285a764c29de13e82cad1a18ce50a5da9a60742b3bc0d0102d9d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ada7a8238c9d285a764c29de13e82cad1a18ce50a5da9a60742b3bc0d0102d9d.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Password: D4v_8+edvC?l. . - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Password: D4v_8+edvC?l. .
Targets
-
-
Target
ada7a8238c9d285a764c29de13e82cad1a18ce50a5da9a60742b3bc0d0102d9d
-
Size
700KB
-
MD5
968cf2f6dd1e574fbd7a60cb2fd057f5
-
SHA1
4e6cfcb4e13006a40eabf999d528fbbc3c5b4c82
-
SHA256
ada7a8238c9d285a764c29de13e82cad1a18ce50a5da9a60742b3bc0d0102d9d
-
SHA512
dfd77ec6fa6d11c34ec44d39e05f31f54e853bec6839567b7ec5712d6c645a371b94cbd35e0f92c770af504700a0a7677075b5294d75db938ed44d87c32ca49a
-
SSDEEP
12288:YEkKt/rFfaJsKSwwg8iUu+XDzFlOr3KQkmgUNscv8j33skCrRk0:9kKN5iJJbwg83lI3jv9sca3RC1k
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-