General
-
Target
f3579a60747a360aaa9753f98f13c53d222fec574c2a6c4f5761d1aa5dff7daf
-
Size
1.0MB
-
Sample
240614-cjhn5avfnk
-
MD5
fd30facc90135f3a238582a79e74d05e
-
SHA1
90977bc83b9aa2da4d13008a30973097715eeb71
-
SHA256
f3579a60747a360aaa9753f98f13c53d222fec574c2a6c4f5761d1aa5dff7daf
-
SHA512
802d80df4acfd69a8239f4515aa6e4fa23720614a05ac38efaeb59ecca07af800391f6f328849035b5f15f23133ba9b3cc814c0e2e4c95002e0a02c40b865a90
-
SSDEEP
24576:hAHnh+eWsN3skA4RV1Hom2KXMmHa12hI+1nOYCjoC85:4h+ZkldoPK8Ya1GI+1nWjo
Static task
static1
Behavioral task
behavioral1
Sample
f3579a60747a360aaa9753f98f13c53d222fec574c2a6c4f5761d1aa5dff7daf.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
f3579a60747a360aaa9753f98f13c53d222fec574c2a6c4f5761d1aa5dff7daf.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Port:
587 - Username:
[email protected]
Targets
-
-
Target
f3579a60747a360aaa9753f98f13c53d222fec574c2a6c4f5761d1aa5dff7daf
-
Size
1.0MB
-
MD5
fd30facc90135f3a238582a79e74d05e
-
SHA1
90977bc83b9aa2da4d13008a30973097715eeb71
-
SHA256
f3579a60747a360aaa9753f98f13c53d222fec574c2a6c4f5761d1aa5dff7daf
-
SHA512
802d80df4acfd69a8239f4515aa6e4fa23720614a05ac38efaeb59ecca07af800391f6f328849035b5f15f23133ba9b3cc814c0e2e4c95002e0a02c40b865a90
-
SSDEEP
24576:hAHnh+eWsN3skA4RV1Hom2KXMmHa12hI+1nOYCjoC85:4h+ZkldoPK8Ya1GI+1nWjo
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-