General
-
Target
7d6c22243fc187ac7fcc301a9ca4432624e0755100b6fe2e93f8c0ec880df316.exe
-
Size
935KB
-
Sample
240710-v6jh2starb
-
MD5
56ab5dc6a2b9432b470aa8d9b1df858e
-
SHA1
c24a8a35d9d4507e21ca02a2549e910accb3ee35
-
SHA256
7d6c22243fc187ac7fcc301a9ca4432624e0755100b6fe2e93f8c0ec880df316
-
SHA512
4d70990228bcc1fd7f3d9579b3c35a99c9ebd463cb08c32f3127158de99a55bbf7c60bf15a94a0836e24726027371ec65a0bab8ae9028950ba5ed3f8c6e5520f
-
SSDEEP
12288:kgJ14ZdwDwhKDmqHMXf9OYIv3gSrCiKQtHllN51so3eN4/zlQrXBpfCrtORj7avO:kgL4ZdwDwhKDPMVi37f3bfucE3fC02V+
Static task
static1
Behavioral task
behavioral1
Sample
7d6c22243fc187ac7fcc301a9ca4432624e0755100b6fe2e93f8c0ec880df316.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7d6c22243fc187ac7fcc301a9ca4432624e0755100b6fe2e93f8c0ec880df316.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.lumies.co.za - Port:
587 - Username:
[email protected] - Password:
vj$)KFsCyFOr - Email To:
[email protected]
Targets
-
-
Target
7d6c22243fc187ac7fcc301a9ca4432624e0755100b6fe2e93f8c0ec880df316.exe
-
Size
935KB
-
MD5
56ab5dc6a2b9432b470aa8d9b1df858e
-
SHA1
c24a8a35d9d4507e21ca02a2549e910accb3ee35
-
SHA256
7d6c22243fc187ac7fcc301a9ca4432624e0755100b6fe2e93f8c0ec880df316
-
SHA512
4d70990228bcc1fd7f3d9579b3c35a99c9ebd463cb08c32f3127158de99a55bbf7c60bf15a94a0836e24726027371ec65a0bab8ae9028950ba5ed3f8c6e5520f
-
SSDEEP
12288:kgJ14ZdwDwhKDmqHMXf9OYIv3gSrCiKQtHllN51so3eN4/zlQrXBpfCrtORj7avO:kgL4ZdwDwhKDPMVi37f3bfucE3fC02V+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-