General
-
Target
c4c4631fef934697b3dc440a5de2292d.bin
-
Size
641KB
-
Sample
240901-b7jewsybmh
-
MD5
1b51dca73b39ab74031be2ecd91d449a
-
SHA1
16de0f36c3ab62888b6137c06ed3c149d63d5e52
-
SHA256
9e5300e3ee2395a6e05f19532b1471bf814f2971909c12b84415c4ff2e35d630
-
SHA512
49ef26c90f19154ab3bbea7e4a08e2e116ed1499ab0bd2d499b2a0e0308cf97b0b3cd07b6801e7d6773258cba51fd07912ead484c495f1109d0bc5b5e962bd8d
-
SSDEEP
12288:RErXk5NYjJs9QZKux1QxfC6bd63SBAFhIQplavMDrL8sfXf:jNeuuKux1uCkdeSBAFhIUlav+82P
Static task
static1
Behavioral task
behavioral1
Sample
0a5816f1e55e810043fd6ac8a6d28eabd755696e76cf1b96d9fc3680c8af6177.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0a5816f1e55e810043fd6ac8a6d28eabd755696e76cf1b96d9fc3680c8af6177.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mahesh-ent.com - Port:
587 - Username:
[email protected] - Password:
M@hesh3981 - Email To:
[email protected]
Targets
-
-
Target
0a5816f1e55e810043fd6ac8a6d28eabd755696e76cf1b96d9fc3680c8af6177.exe
-
Size
1.1MB
-
MD5
c4c4631fef934697b3dc440a5de2292d
-
SHA1
4312088d769c9a86759734b2da54a1a08a5d2c73
-
SHA256
0a5816f1e55e810043fd6ac8a6d28eabd755696e76cf1b96d9fc3680c8af6177
-
SHA512
9c1c1d6216ea8c15cd4cfecf44a36759252b4e32baa63e7b02e799218ad3c5835093c9dd14e54fe1118425398abcb5343d8b106c82eef705eaf0202cadae5b6f
-
SSDEEP
24576:JqDEvCTbMWu7rQYlBQcBiT6rprG8abRpfTr/:JTvC/MTQYxsWR7ab
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-