General
-
Target
fdaaef3df184431dac7f489471ec9de34d4dff895ef7b04be85eb40117477621.exe
-
Size
646KB
-
Sample
240910-cvkb4asdqr
-
MD5
e372ae48f6c86c7491a89876df42aa4d
-
SHA1
04da90d9bf4af0778b27c6f5f8890096ffd7061a
-
SHA256
fdaaef3df184431dac7f489471ec9de34d4dff895ef7b04be85eb40117477621
-
SHA512
38c15bb091d79f52a5952fa757581b9a3dedcba39effaa81cc6c75739386a8bd0f8c8cb5d8c0be9d54c66dd4d48341360687c8ee0673f31a73476a089991c22d
-
SSDEEP
12288:YltuKOcMKJ/TI+oeGuL9JaLNvsNP6L/Dm6Vp2qBZznT4OkfG:AOo/c+oeGuROtaPyCU2yZz0OmG
Static task
static1
Behavioral task
behavioral1
Sample
fdaaef3df184431dac7f489471ec9de34d4dff895ef7b04be85eb40117477621.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.andalan-pacific.com - Port:
587 - Username:
[email protected] - Password:
OperationAPS2024 - Email To:
[email protected]
Targets
-
-
Target
fdaaef3df184431dac7f489471ec9de34d4dff895ef7b04be85eb40117477621.exe
-
Size
646KB
-
MD5
e372ae48f6c86c7491a89876df42aa4d
-
SHA1
04da90d9bf4af0778b27c6f5f8890096ffd7061a
-
SHA256
fdaaef3df184431dac7f489471ec9de34d4dff895ef7b04be85eb40117477621
-
SHA512
38c15bb091d79f52a5952fa757581b9a3dedcba39effaa81cc6c75739386a8bd0f8c8cb5d8c0be9d54c66dd4d48341360687c8ee0673f31a73476a089991c22d
-
SSDEEP
12288:YltuKOcMKJ/TI+oeGuL9JaLNvsNP6L/Dm6Vp2qBZznT4OkfG:AOo/c+oeGuROtaPyCU2yZz0OmG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-