General
-
Target
5a8ca542ea26068db3ef77ce1863fda05273e10eda5b094b16a9c33a51fc2ea8
-
Size
1.1MB
-
Sample
241017-bkdk5atfjg
-
MD5
4898312c6d278ff9aae2b568f8edb6f9
-
SHA1
3de0b52a37fbbcf52655ed3fa27febbb8425e7cd
-
SHA256
5a8ca542ea26068db3ef77ce1863fda05273e10eda5b094b16a9c33a51fc2ea8
-
SHA512
e7a2ce3e233abcf42193e0b06ddee19a2ed70ddd02cdbb97bbeddda4eb3a939e94c67004fbaa006980ad06ca31c18be667a138449341846292b69f080596495e
-
SSDEEP
12288:4eq8GC2hFkknD8EVK2EmbSQInGT8xTjwfT5FW+8mjQ8NNdgHRoUUnw625mhn/JwB:4k02i8cKXNGT6Q/WzB8WqfzybpXf
Static task
static1
Behavioral task
behavioral1
Sample
5a8ca542ea26068db3ef77ce1863fda05273e10eda5b094b16a9c33a51fc2ea8.exe
Resource
win7-20241010-en
Malware Config
Extracted
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
UBnnnstayQMK
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
UBnnnstayQMK - Email To:
[email protected]
Targets
-
-
Target
5a8ca542ea26068db3ef77ce1863fda05273e10eda5b094b16a9c33a51fc2ea8
-
Size
1.1MB
-
MD5
4898312c6d278ff9aae2b568f8edb6f9
-
SHA1
3de0b52a37fbbcf52655ed3fa27febbb8425e7cd
-
SHA256
5a8ca542ea26068db3ef77ce1863fda05273e10eda5b094b16a9c33a51fc2ea8
-
SHA512
e7a2ce3e233abcf42193e0b06ddee19a2ed70ddd02cdbb97bbeddda4eb3a939e94c67004fbaa006980ad06ca31c18be667a138449341846292b69f080596495e
-
SSDEEP
12288:4eq8GC2hFkknD8EVK2EmbSQInGT8xTjwfT5FW+8mjQ8NNdgHRoUUnw625mhn/JwB:4k02i8cKXNGT6Q/WzB8WqfzybpXf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-