General
-
Target
450230549.exe
-
Size
105KB
-
Sample
240926-h13zaaxbja
-
MD5
5086980f3ee0c035ec304102e6981410
-
SHA1
fca1625b36a002d77f69586f96744dfbcde1d472
-
SHA256
bfcef30ac8c0270957b3126d0b9046ddd4bc67fdffea077dd0a127809aa233a6
-
SHA512
baca4e5d7b1c7f4a7ddcf1ff2ba9876677a9ec43f5a4f6f985f55225b6d59ddb50bb7da1609a91b2ba389796e42407164111d9268dbc6a930f8b180da6d8e2c2
-
SSDEEP
1536:YPDs/XKdUDp1lRzloawwPI7zwHPG72uu630VDxl7Hxij7wPTxq:YP4b1lFLwM9PG720EVDxlQjcPU
Static task
static1
Behavioral task
behavioral1
Sample
450230549.exe
Resource
win7-20240729-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Anambraeast@ - Email To:
[email protected]
Targets
-
-
Target
450230549.exe
-
Size
105KB
-
MD5
5086980f3ee0c035ec304102e6981410
-
SHA1
fca1625b36a002d77f69586f96744dfbcde1d472
-
SHA256
bfcef30ac8c0270957b3126d0b9046ddd4bc67fdffea077dd0a127809aa233a6
-
SHA512
baca4e5d7b1c7f4a7ddcf1ff2ba9876677a9ec43f5a4f6f985f55225b6d59ddb50bb7da1609a91b2ba389796e42407164111d9268dbc6a930f8b180da6d8e2c2
-
SSDEEP
1536:YPDs/XKdUDp1lRzloawwPI7zwHPG72uu630VDxl7Hxij7wPTxq:YP4b1lFLwM9PG720EVDxlQjcPU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-