General
-
Target
tmp4rzaoto2
-
Size
1.1MB
-
Sample
240918-ebb8gs1dma
-
MD5
07a958109854778ba3f891872d8d0734
-
SHA1
4dc9a5067843fccd066bc6de7386760471ce46de
-
SHA256
3251093aa6fdae864fe5072d57e4b976ae384281f5a6b1e707a15ceb8af152b1
-
SHA512
f82216eb457b98d0f3c74d3385338e48111a8b701d3a8b69507dab09dfe8a4586f7ff0bea3762da9411f8d31c96bee9d4036aabd55a926b24c58f706bac07039
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaC1jU5S7Ufq510csTteku0mAgI/o:7JZoQrbTFZY1iaCL7Ufqr01teUmAR/o
Static task
static1
Behavioral task
behavioral1
Sample
tmp4rzaoto2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
tmp4rzaoto2.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bonnyriggdentalsurgery.com.au - Port:
587 - Username:
[email protected] - Password:
eL)rV@QBKA#m - Email To:
[email protected]
Targets
-
-
Target
tmp4rzaoto2
-
Size
1.1MB
-
MD5
07a958109854778ba3f891872d8d0734
-
SHA1
4dc9a5067843fccd066bc6de7386760471ce46de
-
SHA256
3251093aa6fdae864fe5072d57e4b976ae384281f5a6b1e707a15ceb8af152b1
-
SHA512
f82216eb457b98d0f3c74d3385338e48111a8b701d3a8b69507dab09dfe8a4586f7ff0bea3762da9411f8d31c96bee9d4036aabd55a926b24c58f706bac07039
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaC1jU5S7Ufq510csTteku0mAgI/o:7JZoQrbTFZY1iaCL7Ufqr01teUmAR/o
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-