General
-
Target
56fdd77d4097b1ce3500d7178788e35731ffe0be159bca0bd1efe4e0477affa3.exe
-
Size
1.9MB
-
Sample
250110-rhbxhsymbk
-
MD5
89471f2ae47d710f5b6db4afe8a48e77
-
SHA1
903d8a21673dcc19826fa56731dc2710f2d95755
-
SHA256
56fdd77d4097b1ce3500d7178788e35731ffe0be159bca0bd1efe4e0477affa3
-
SHA512
6f621de51e83544a0b1aa8c65b588f553049f32d8a441a65d9b7f1fdf637c7e96af593172aadf77f6260cef3e5de78924a1032964b9412ad7eec579e4c578852
-
SSDEEP
49152:ZbdYAm4zrbdYAm4zobdYAm4zvbdYAm4zdbdYAm4zZbdYAm4zpQBaYPxjFqFJ:Rdr3drCdrzdrddrRdruLPxBU
Static task
static1
Behavioral task
behavioral1
Sample
56fdd77d4097b1ce3500d7178788e35731ffe0be159bca0bd1efe4e0477affa3.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
M992uew1mw6Z - Email To:
[email protected]
Targets
-
-
Target
56fdd77d4097b1ce3500d7178788e35731ffe0be159bca0bd1efe4e0477affa3.exe
-
Size
1.9MB
-
MD5
89471f2ae47d710f5b6db4afe8a48e77
-
SHA1
903d8a21673dcc19826fa56731dc2710f2d95755
-
SHA256
56fdd77d4097b1ce3500d7178788e35731ffe0be159bca0bd1efe4e0477affa3
-
SHA512
6f621de51e83544a0b1aa8c65b588f553049f32d8a441a65d9b7f1fdf637c7e96af593172aadf77f6260cef3e5de78924a1032964b9412ad7eec579e4c578852
-
SSDEEP
49152:ZbdYAm4zrbdYAm4zobdYAm4zvbdYAm4zdbdYAm4zZbdYAm4zpQBaYPxjFqFJ:Rdr3drCdrzdrddrRdruLPxBU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-