General
-
Target
c593f0f725697c983674b57afbf1d63c47acb105e9942a40f8586ce8c890293e.exe
-
Size
370KB
-
Sample
240705-xz23xstdrr
-
MD5
250631853c7cf62a4a3cc683017e2be4
-
SHA1
588c3f2836b60acd1401e1ac4789fde1a8f6320a
-
SHA256
c593f0f725697c983674b57afbf1d63c47acb105e9942a40f8586ce8c890293e
-
SHA512
5f6a0d4fe0ab138c67c9b58970df616267a08457a6bca896dde6de22b6ff815114d3c1ae5e7bef2dcc3e101412f6c3c95fcc14fdf442e90a98ed039259563592
-
SSDEEP
6144:ZsKxNX1AZr4pmt/DjcT3VMgEWM9GBSZm7QgypKKq16SgFMsNjUIoZP4tq:JWZr4pmtbjcT3ygKGBSTRq16TVLoatq
Static task
static1
Behavioral task
behavioral1
Sample
c593f0f725697c983674b57afbf1d63c47acb105e9942a40f8586ce8c890293e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c593f0f725697c983674b57afbf1d63c47acb105e9942a40f8586ce8c890293e.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240704-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.uvapisa.com - Port:
587 - Username:
[email protected] - Password:
Apis@2020 - Email To:
[email protected]
Targets
-
-
Target
c593f0f725697c983674b57afbf1d63c47acb105e9942a40f8586ce8c890293e.exe
-
Size
370KB
-
MD5
250631853c7cf62a4a3cc683017e2be4
-
SHA1
588c3f2836b60acd1401e1ac4789fde1a8f6320a
-
SHA256
c593f0f725697c983674b57afbf1d63c47acb105e9942a40f8586ce8c890293e
-
SHA512
5f6a0d4fe0ab138c67c9b58970df616267a08457a6bca896dde6de22b6ff815114d3c1ae5e7bef2dcc3e101412f6c3c95fcc14fdf442e90a98ed039259563592
-
SSDEEP
6144:ZsKxNX1AZr4pmt/DjcT3VMgEWM9GBSZm7QgypKKq16SgFMsNjUIoZP4tq:JWZr4pmtbjcT3ygKGBSTRq16TVLoatq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
883eff06ac96966270731e4e22817e11
-
SHA1
523c87c98236cbc04430e87ec19b977595092ac8
-
SHA256
44e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
-
SHA512
60333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
SSDEEP
96:UPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+l:UPtkuWJX7zB3kGwfy0nyUVsxCjOMb1u
Score3/10 -
-
-
Target
$PLUGINSDIR/nsExec.dll
-
Size
6KB
-
MD5
8d4278d0b0af44c989ed14ea40b75e06
-
SHA1
072f92761b281bc20d0bc3b3486251f60e6c259f
-
SHA256
9c50ba10ff8009137ad005aee7bdcace042ff343b37e11cd6ca45a6186ae977e
-
SHA512
1a22c3aa8ea1ff980b5c7812f75a9369cfd74f2b780039e79c0c52eb00cb019bac6f860e97a7279f0c8e4c890e5dd1bca31e69d6548fc73397d4fa05c8b12542
-
SSDEEP
96:N7GUaYNwCLuGFctpiKFlYJ8hH4RVHpwdEeY3kRlDr6dMqqyVgNw38:xygp3FcHi0xhYMR8dMqJVgN
Score3/10 -