General
-
Target
df22c622ece919c5d8118064a40dcb4b13b998333efa50a2727332a08f6de592
-
Size
735KB
-
Sample
250125-bmr7aszkak
-
MD5
4d0215e757c2b16805e0fd3f02153cfa
-
SHA1
fa61b227f524932a613396437f28c11e27706da4
-
SHA256
df22c622ece919c5d8118064a40dcb4b13b998333efa50a2727332a08f6de592
-
SHA512
756e349e33d89baaad357f910835634a401b540a3ade3eb2a604cc0978d508a0496d12382a988e1e6cd9c535e6996d0647dd6c6fb4d2efe2090066af0277c456
-
SSDEEP
12288:hpplJI5OCf9pYFrXhkTxGYMPOkKNOAKRiLyiaQBq+MnGY5fY0PtqwnYQIbwNWjJ+:hX45FA3KUzPOkH3iLi7nf5w0AvbbJ
Static task
static1
Behavioral task
behavioral1
Sample
df22c622ece919c5d8118064a40dcb4b13b998333efa50a2727332a08f6de592.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df22c622ece919c5d8118064a40dcb4b13b998333efa50a2727332a08f6de592.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
w#chNV#1 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
w#chNV#1
Targets
-
-
Target
df22c622ece919c5d8118064a40dcb4b13b998333efa50a2727332a08f6de592
-
Size
735KB
-
MD5
4d0215e757c2b16805e0fd3f02153cfa
-
SHA1
fa61b227f524932a613396437f28c11e27706da4
-
SHA256
df22c622ece919c5d8118064a40dcb4b13b998333efa50a2727332a08f6de592
-
SHA512
756e349e33d89baaad357f910835634a401b540a3ade3eb2a604cc0978d508a0496d12382a988e1e6cd9c535e6996d0647dd6c6fb4d2efe2090066af0277c456
-
SSDEEP
12288:hpplJI5OCf9pYFrXhkTxGYMPOkKNOAKRiLyiaQBq+MnGY5fY0PtqwnYQIbwNWjJ+:hX45FA3KUzPOkH3iLi7nf5w0AvbbJ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-