General
-
Target
e7db3ac5de235ef432d55b8fd2bf0f400ad26690b7efbb513d9d3cf178bf393d.exe
-
Size
579KB
-
Sample
240918-b5c54awdpc
-
MD5
644b264aa14aa44fbf2d50b958922b3a
-
SHA1
6aaf3b3a12252a8e15c0d00a883d5707cf7a9268
-
SHA256
e7db3ac5de235ef432d55b8fd2bf0f400ad26690b7efbb513d9d3cf178bf393d
-
SHA512
ef47297dd90de1f3803f1e579ee26d600b79d52d71d96a79a7d3c7f05c01def64f0c3ef82be234a5d083450732273031bb9250b909688b2119dd68ff25e32001
-
SSDEEP
6144:+CvZQF89OVamhgTLcYAWeBlE/8OZ1bN8XnBNDGH1HS+guQzCbzVB8PQqZzHbHI5u:+CuFjGTwWddZ1S3BNuE+ezCn2b4C
Static task
static1
Behavioral task
behavioral1
Sample
e7db3ac5de235ef432d55b8fd2bf0f400ad26690b7efbb513d9d3cf178bf393d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7db3ac5de235ef432d55b8fd2bf0f400ad26690b7efbb513d9d3cf178bf393d.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
logxtai.shop - Port:
587 - Username:
[email protected] - Password:
P2I7QjES_T6o - Email To:
[email protected]
Targets
-
-
Target
e7db3ac5de235ef432d55b8fd2bf0f400ad26690b7efbb513d9d3cf178bf393d.exe
-
Size
579KB
-
MD5
644b264aa14aa44fbf2d50b958922b3a
-
SHA1
6aaf3b3a12252a8e15c0d00a883d5707cf7a9268
-
SHA256
e7db3ac5de235ef432d55b8fd2bf0f400ad26690b7efbb513d9d3cf178bf393d
-
SHA512
ef47297dd90de1f3803f1e579ee26d600b79d52d71d96a79a7d3c7f05c01def64f0c3ef82be234a5d083450732273031bb9250b909688b2119dd68ff25e32001
-
SSDEEP
6144:+CvZQF89OVamhgTLcYAWeBlE/8OZ1bN8XnBNDGH1HS+guQzCbzVB8PQqZzHbHI5u:+CuFjGTwWddZ1S3BNuE+ezCn2b4C
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-