General
-
Target
6bcbf46ea9f61b2e443ae1b4d8b8e63e610fb894ee404694c166c96486735fa2
-
Size
657KB
-
Sample
240605-b9zjwsaf81
-
MD5
b305cd91272473b55f47ce13eca2f049
-
SHA1
dea9b56ab6ee5d31e35e62322273738ee1997166
-
SHA256
6bcbf46ea9f61b2e443ae1b4d8b8e63e610fb894ee404694c166c96486735fa2
-
SHA512
99def62c0e4fce5f133898c1cd8c63dee3cf223c832b44830d54ae745695ad36558cae8eff99a75981a5e75c2453e6bf63b034318b14097cff9d8350d01fdec2
-
SSDEEP
12288:j+3yvK/gEOcG4sKbZTckii5Ni5wHT+Haqv3Tuyk8:AytxKbfieNlHT5CCy
Static task
static1
Behavioral task
behavioral1
Sample
6bcbf46ea9f61b2e443ae1b4d8b8e63e610fb894ee404694c166c96486735fa2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6bcbf46ea9f61b2e443ae1b4d8b8e63e610fb894ee404694c166c96486735fa2.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.farm-valley.com - Port:
587 - Username:
[email protected] - Password:
Businessvalley@2020
Extracted
agenttesla
Protocol: smtp- Host:
mail.farm-valley.com - Port:
587 - Username:
[email protected] - Password:
Businessvalley@2020 - Email To:
[email protected]
Targets
-
-
Target
6bcbf46ea9f61b2e443ae1b4d8b8e63e610fb894ee404694c166c96486735fa2
-
Size
657KB
-
MD5
b305cd91272473b55f47ce13eca2f049
-
SHA1
dea9b56ab6ee5d31e35e62322273738ee1997166
-
SHA256
6bcbf46ea9f61b2e443ae1b4d8b8e63e610fb894ee404694c166c96486735fa2
-
SHA512
99def62c0e4fce5f133898c1cd8c63dee3cf223c832b44830d54ae745695ad36558cae8eff99a75981a5e75c2453e6bf63b034318b14097cff9d8350d01fdec2
-
SSDEEP
12288:j+3yvK/gEOcG4sKbZTckii5Ni5wHT+Haqv3Tuyk8:AytxKbfieNlHT5CCy
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-