General
-
Target
808f416218be5633bdee356f7c759ecc06a8c29dbfe25eb139be8995877f6582
-
Size
524KB
-
Sample
250123-bqme8awmbq
-
MD5
463aebf2e7eb05d79e2d8cbfe8e6906f
-
SHA1
6bcd822b22c5a0fa533104edb00a7693dc0f1fbb
-
SHA256
808f416218be5633bdee356f7c759ecc06a8c29dbfe25eb139be8995877f6582
-
SHA512
9c8c6bcf751b1032acbb0c05d6d1544aeeb7e55a98ce691a1c699787a4f2c89a0477e665097598e98828a6063c4b99a4e010b4521df0e9cf4b22f75dbc9b61a4
-
SSDEEP
12288:Gew3A2c3JXZvSJZzQ3pXJYbfTvrsYtwQEAE:Geww2CYQ3pX+rTvriAE
Static task
static1
Behavioral task
behavioral1
Sample
DATASHEET.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DATASHEET.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
graceofgod@amen - Email To:
[email protected]
Targets
-
-
Target
DATASHEET.exe
-
Size
464KB
-
MD5
07125fc15f7a109f6a067d38257faa94
-
SHA1
c196c27cd72a380dc5d4864831320f9d00078d73
-
SHA256
f72267ce7456d977ff81981b8704a697b2198263570203f394c5a306705d8a70
-
SHA512
d5d0ac6bb5e0f09e0b55fe505eb0e8f407408154ba604894cf57a3da07779f5b63f202ec92ce45bf59c9454daa9315ec51657b3db01d0b16c79dc42377ef747b
-
SSDEEP
12288:Jew3A2c3JXZvSJZzQ3pXJYbfTvrsYtwQEAE:Jeww2CYQ3pX+rTvriAE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-