General
-
Target
906c1863777e91ff508ccb1758ee2f7bdec9cb59f0c251e0a1ddd64d9cc82548.exe
-
Size
243KB
-
Sample
240704-b7cbkszcna
-
MD5
f0584ec3946ed12facabaae4789235b7
-
SHA1
f58a9f4ea1fb7aa409e029fcb0c976dc680ac034
-
SHA256
906c1863777e91ff508ccb1758ee2f7bdec9cb59f0c251e0a1ddd64d9cc82548
-
SHA512
ba3c56dcbf49102b7293f6e1e2543668ffc700a352208be48a388cdf03a09f85b7b7366a4e58f6d0f629d76b812822fa5a0efe8ffdb9c2010252e14d94515f19
-
SSDEEP
3072:rfznzvDu7CYtOsaPDUGAaVIPhVBrP2xtezLAf5spKS6hc:rfznzvDu7zOsu1IwLefAUKdh
Behavioral task
behavioral1
Sample
906c1863777e91ff508ccb1758ee2f7bdec9cb59f0c251e0a1ddd64d9cc82548.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
906c1863777e91ff508ccb1758ee2f7bdec9cb59f0c251e0a1ddd64d9cc82548.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.expresscargoes.net - Port:
587 - Username:
[email protected] - Password:
QAZ1234P0#WA - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.expresscargoes.net - Port:
587 - Username:
[email protected] - Password:
QAZ1234P0#WA
Targets
-
-
Target
906c1863777e91ff508ccb1758ee2f7bdec9cb59f0c251e0a1ddd64d9cc82548.exe
-
Size
243KB
-
MD5
f0584ec3946ed12facabaae4789235b7
-
SHA1
f58a9f4ea1fb7aa409e029fcb0c976dc680ac034
-
SHA256
906c1863777e91ff508ccb1758ee2f7bdec9cb59f0c251e0a1ddd64d9cc82548
-
SHA512
ba3c56dcbf49102b7293f6e1e2543668ffc700a352208be48a388cdf03a09f85b7b7366a4e58f6d0f629d76b812822fa5a0efe8ffdb9c2010252e14d94515f19
-
SSDEEP
3072:rfznzvDu7CYtOsaPDUGAaVIPhVBrP2xtezLAf5spKS6hc:rfznzvDu7zOsu1IwLefAUKdh
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-