General
-
Target
22e139434f5f7b479d43bc2febcd141b91c7b168fe49f48081e32990b80acf00.exe
-
Size
1.0MB
-
Sample
240903-rezjeayenn
-
MD5
7b8138e4e92b1319fbcc38804852529a
-
SHA1
532a10d373a289d9083217fab8cdfe9134e5385d
-
SHA256
22e139434f5f7b479d43bc2febcd141b91c7b168fe49f48081e32990b80acf00
-
SHA512
f936b0f07ec180238d381172d6e63e79c4cce92e9b86a5c271ffba540098d80f44d74550a82565c6ffcd94e115b203fb5b98b6170900fbed780d61eeb2c75ffb
-
SSDEEP
24576:VAHnh+eWsN3skA4RV1Hom2KXMmHamX5GbsoSE5:Eh+ZkldoPK8YamXAs8
Static task
static1
Behavioral task
behavioral1
Sample
22e139434f5f7b479d43bc2febcd141b91c7b168fe49f48081e32990b80acf00.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
22e139434f5f7b479d43bc2febcd141b91c7b168fe49f48081e32990b80acf00.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.eatrepeatindia.com - Port:
587 - Username:
[email protected] - Password:
QQYIO12fxBmdO - Email To:
[email protected]
Targets
-
-
Target
22e139434f5f7b479d43bc2febcd141b91c7b168fe49f48081e32990b80acf00.exe
-
Size
1.0MB
-
MD5
7b8138e4e92b1319fbcc38804852529a
-
SHA1
532a10d373a289d9083217fab8cdfe9134e5385d
-
SHA256
22e139434f5f7b479d43bc2febcd141b91c7b168fe49f48081e32990b80acf00
-
SHA512
f936b0f07ec180238d381172d6e63e79c4cce92e9b86a5c271ffba540098d80f44d74550a82565c6ffcd94e115b203fb5b98b6170900fbed780d61eeb2c75ffb
-
SSDEEP
24576:VAHnh+eWsN3skA4RV1Hom2KXMmHamX5GbsoSE5:Eh+ZkldoPK8YamXAs8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-