General
-
Target
24082024_0156_23082024_EV 4880 AF 271075403.zip
-
Size
663KB
-
Sample
240824-ccvp4s1gnp
-
MD5
3fe4be4772a6c9e117c3d66c9915b33e
-
SHA1
e8b034da9b3f6d7af2165a20d77d8411ea22a4ea
-
SHA256
35ad60072a4bee41fee93ee3b1d0725fc8eeef388bdbba755d9944b8115ab805
-
SHA512
67506babf9969706b0dc4367ed165200481b28faec6950b824dbbe89be0aeb489631b252e49e681580c599ae8b50581291e75c64a7a52250db7a3be3ca84b079
-
SSDEEP
12288:T4ESMB+hb6goyodG4kmveCR4UMV2O9bqUq1b1yvD6Wkwyj+n8L:T4D5eg1eBkmGCuCO9+UqTyb3k1+6
Static task
static1
Behavioral task
behavioral1
Sample
enyioma.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
enyioma.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.claresbout.com - Port:
587 - Username:
[email protected] - Password:
fahaF^V7 - Email To:
[email protected]
Targets
-
-
Target
enyioma.exe
-
Size
1.1MB
-
MD5
462dc62ec8cf0582b45cca66c0d16eb6
-
SHA1
6725468bb6b388ae894cb6c168621f970398ae5f
-
SHA256
b24e9e338775a89120c668c30ac6c6f2064160e9442988f8e8ea807d7d309a2e
-
SHA512
c8027f3d7b6c3a86e2ad265fd7cf501266b42c6b46f9704942b85a130975a8fb546ab3b51ae00db77d3a3be290ac672fc86b89e86d40d5bcb3a0e378b72aa98b
-
SSDEEP
24576:4qDEvCTbMWu7rQYlBQcBiT6rprG8aye+qV6zLkRh:4TvC/MTQYxsWR7aye+CSLk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-