General
-
Target
ego.exe
-
Size
1.1MB
-
Sample
240924-qgyjfszbpf
-
MD5
0a81ce0a1b317625cc55e2f68bef7b94
-
SHA1
63391d5644886111ad206fc0f71974fa2ae79197
-
SHA256
b5efb5f0b24cb7cd10a6a02d0d0661e9ea277d6997e76691fc6065da23208338
-
SHA512
23cdd0b77fa9f24ff03d7cf1371de6620a18230901395dcde8b797901b4906985343dfe7c89a8b42ebff91ddcfdae913d1b4112817d30da04dfe0b38fa9664ff
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCJyqWHUztNNa37DBiZ1YTe:7JZoQrbTFZY1iaCiOLard9e
Static task
static1
Behavioral task
behavioral1
Sample
ego.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ego.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
techniqueqatar.com - Port:
587 - Username:
[email protected] - Password:
TechFB2023$$$ - Email To:
[email protected]
Targets
-
-
Target
ego.exe
-
Size
1.1MB
-
MD5
0a81ce0a1b317625cc55e2f68bef7b94
-
SHA1
63391d5644886111ad206fc0f71974fa2ae79197
-
SHA256
b5efb5f0b24cb7cd10a6a02d0d0661e9ea277d6997e76691fc6065da23208338
-
SHA512
23cdd0b77fa9f24ff03d7cf1371de6620a18230901395dcde8b797901b4906985343dfe7c89a8b42ebff91ddcfdae913d1b4112817d30da04dfe0b38fa9664ff
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCJyqWHUztNNa37DBiZ1YTe:7JZoQrbTFZY1iaCiOLard9e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-