General
-
Target
9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe
-
Size
631KB
-
Sample
240903-cj3pasthjk
-
MD5
00261db2bfac32edfbdbf38b51370c13
-
SHA1
6de5e2fcfb1f6195d6b241da62b9c9888f0ca44f
-
SHA256
9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68
-
SHA512
a9c4602fd38f366077d851b89f793be0b2f44b7dd306590b62b4a8ee53b3bf6c828f060bc7305539ecce133a255c8f04b8d3200c61750183f50619fc620e2dac
-
SSDEEP
12288:RwfufVLrggT2l/PhteSmaYmpMMnFMc4v3CPkQgdOeXk/U:Rw0V/gG8/PhtqaY2FgOck/U
Static task
static1
Behavioral task
behavioral1
Sample
9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
%qroUozO;(C2Rlyb - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
%qroUozO;(C2Rlyb
Targets
-
-
Target
9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe
-
Size
631KB
-
MD5
00261db2bfac32edfbdbf38b51370c13
-
SHA1
6de5e2fcfb1f6195d6b241da62b9c9888f0ca44f
-
SHA256
9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68
-
SHA512
a9c4602fd38f366077d851b89f793be0b2f44b7dd306590b62b4a8ee53b3bf6c828f060bc7305539ecce133a255c8f04b8d3200c61750183f50619fc620e2dac
-
SSDEEP
12288:RwfufVLrggT2l/PhteSmaYmpMMnFMc4v3CPkQgdOeXk/U:Rw0V/gG8/PhtqaY2FgOck/U
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-