General
-
Target
0b905272fa9975536188ab11ef27dca1658a41ac3076aa07213ff20695cc3b68
-
Size
164KB
-
Sample
250112-berwkaxqgs
-
MD5
4cc9eff269022ab111e740000f022f2a
-
SHA1
9c0ebfffb6632c7c4b55b9dd4157f825d406413c
-
SHA256
0b905272fa9975536188ab11ef27dca1658a41ac3076aa07213ff20695cc3b68
-
SHA512
ea43813a14628a2c6deee220db3e7c7faed4d03c750c850ca95fe6c02a206c5ee7e5981fa2b691003fb95e5c2b988a80844a9fbd8e166b43a77b1251714a5486
-
SSDEEP
3072:1J9K8XOiZoFs+wGQtN4gG1C8wMP/DlviRx4YkIxhFQ:1DXOBFs+wG2N4ZCEz1iRxPx
Behavioral task
behavioral1
Sample
0b905272fa9975536188ab11ef27dca1658a41ac3076aa07213ff20695cc3b68.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b905272fa9975536188ab11ef27dca1658a41ac3076aa07213ff20695cc3b68.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server1.sqsendy.shop - Port:
587 - Username:
[email protected] - Password:
^Qt*UoquP.CM - Email To:
[email protected]
Targets
-
-
Target
0b905272fa9975536188ab11ef27dca1658a41ac3076aa07213ff20695cc3b68
-
Size
164KB
-
MD5
4cc9eff269022ab111e740000f022f2a
-
SHA1
9c0ebfffb6632c7c4b55b9dd4157f825d406413c
-
SHA256
0b905272fa9975536188ab11ef27dca1658a41ac3076aa07213ff20695cc3b68
-
SHA512
ea43813a14628a2c6deee220db3e7c7faed4d03c750c850ca95fe6c02a206c5ee7e5981fa2b691003fb95e5c2b988a80844a9fbd8e166b43a77b1251714a5486
-
SSDEEP
3072:1J9K8XOiZoFs+wGQtN4gG1C8wMP/DlviRx4YkIxhFQ:1DXOBFs+wG2N4ZCEz1iRxPx
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-