General
-
Target
Mt103.exe
-
Size
609KB
-
Sample
240624-kh5q9stbnc
-
MD5
4b4c0296f03c4696fc932f25b106c67e
-
SHA1
3013d914be42bc00169033ab69f3a5322a92c602
-
SHA256
f31627c0be61c3d8cd84264e59bab7e0eeadbd07170f69b0dd08883e7b3591e1
-
SHA512
ad9d03bd56863b6bc2bd9680489559dd04bec53c8d717cbecc0a15f44addb7681c67d4c5c421b53854c338ecf589542c3ffd59ee207e6981eecc4630add780d4
-
SSDEEP
12288:7YV6MorX7qzuC3QHO9FQVHPF51jgcUq0gG+d69A7iaIhuvyKehO:YBXu9HGaVHB0TtAeaSyy34
Behavioral task
behavioral1
Sample
Mt103.exe
Resource
win7-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.fokusmuhnedislik.com - Port:
587 - Username:
[email protected] - Password:
IFYBVGQ1 - Email To:
[email protected]
Targets
-
-
Target
Mt103.exe
-
Size
609KB
-
MD5
4b4c0296f03c4696fc932f25b106c67e
-
SHA1
3013d914be42bc00169033ab69f3a5322a92c602
-
SHA256
f31627c0be61c3d8cd84264e59bab7e0eeadbd07170f69b0dd08883e7b3591e1
-
SHA512
ad9d03bd56863b6bc2bd9680489559dd04bec53c8d717cbecc0a15f44addb7681c67d4c5c421b53854c338ecf589542c3ffd59ee207e6981eecc4630add780d4
-
SSDEEP
12288:7YV6MorX7qzuC3QHO9FQVHPF51jgcUq0gG+d69A7iaIhuvyKehO:YBXu9HGaVHB0TtAeaSyy34
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-