General
-
Target
63ced43e57ec66bf94a9c08126f3ec23.bin
-
Size
537KB
-
Sample
240613-b4eyaszcla
-
MD5
50f57360b4528e10dde808878f4897be
-
SHA1
5d82fd10ef0ac47995928a1cd46a62a30a6c48bc
-
SHA256
5611e0f982655e3db3c54e693d8bfdecba7e9fc85343734e246571ede7767f8d
-
SHA512
f2acb049ddb8d0ce15292285dd6da081005988b346390e180025f14da9b6a98dfff86a1e3e020349c97c05beaab3d5f259c751fcdaad8cd31fb255e08f4c90e5
-
SSDEEP
12288:2XM9pAHpnoVuAkGqMOp3zEU9r2ptH9i7D8BYR:2XMYHtmuoqMQDEmSDH9VBc
Static task
static1
Behavioral task
behavioral1
Sample
f7339d9f31a002fbdfc344d66b2b5f5c68179a14860a4e94745ae8ea094a44ea.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
f7339d9f31a002fbdfc344d66b2b5f5c68179a14860a4e94745ae8ea094a44ea.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.effco.co.tz - Port:
587 - Username:
[email protected] - Password:
flora@effco=123 - Email To:
[email protected]
Targets
-
-
Target
f7339d9f31a002fbdfc344d66b2b5f5c68179a14860a4e94745ae8ea094a44ea.exe
-
Size
745KB
-
MD5
63ced43e57ec66bf94a9c08126f3ec23
-
SHA1
7cae8cb95ef6d29752499d9b4d4ed9ddc6b35fab
-
SHA256
f7339d9f31a002fbdfc344d66b2b5f5c68179a14860a4e94745ae8ea094a44ea
-
SHA512
f0781db9432b440783c3a233f782a9b8d1edd7818d1ef0ca9dbe3378359873d6e7e27c264982bf153f87d17e1b5b4ccb3388821aa5003b1daa0330b28471ce8e
-
SSDEEP
12288:etTmZFFzNSk57GrRyboYuWu0+hXI6dJBTPL3NSxf+A3itc2:1ZFFn57GrRyRuy+hTdJBTzQxf+GitR
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-