General
-
Target
b8f91c67dc4f9375a08d60ec6901e3114a51fcb6841d0b922197ae7e8ed2f44a.zip
-
Size
1.1MB
-
Sample
250121-ea6qpsvleq
-
MD5
5de57879066abaa85a672343118b37f8
-
SHA1
8d507ee263e73bb54b19b6e4446ffa864addd406
-
SHA256
b8f91c67dc4f9375a08d60ec6901e3114a51fcb6841d0b922197ae7e8ed2f44a
-
SHA512
ea7ffa13f66564a7ee13b4fb39249b8fdcb043510a7039d8a20122f1cf66dc4e9089db105ef96bfd8be01ded5a0c3ef255be64dfab65492aea1c29bcdb1085e6
-
SSDEEP
24576:Kh3RAK1raWUKr/w1AphK3OrB4bGsWmJpswonWoj/82SfS:Kz31GWS1APKg+jWSproj/nL
Static task
static1
Behavioral task
behavioral1
Sample
Po Tooling CT24023023 CTA240714.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Targets
-
-
Target
Po Tooling CT24023023 CTA240714.exe
-
Size
1.3MB
-
MD5
0ff78cd7bb7650ceae70f16df404c664
-
SHA1
512f82194d080f800d339bb9f18e43329bebfac3
-
SHA256
c2fdf0438984ccabe7c3c032fa7136fec9859cabf00e83d6a5915649fc7e89bb
-
SHA512
77d71a01ca169582234b37b0826796b8c29d6b18577da56f72dc5f828feeeab342e7c63aa06b92acabfcc22a7c674f20dba09dbde01a20c6f4e0726c7d3bb1a3
-
SSDEEP
24576:R93pGRzhB7La7tj41esme5CM4OjBa/n3G9CJMsDBU9ZFncMBeY1qC:RMH91Hme5N23EGMJcRC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-