General
-
Target
6536e9cdd39ffb3abc509468f74e4620dc40ee10a4d0b07c64d8b513455d6c68
-
Size
44KB
-
Sample
250128-bc6a6sskhl
-
MD5
5f499b57da7faffbcbaccc5e8d3d2833
-
SHA1
9e4fdec1ab203524507562bdf3a9e89ed0325fa5
-
SHA256
6536e9cdd39ffb3abc509468f74e4620dc40ee10a4d0b07c64d8b513455d6c68
-
SHA512
82198722dd54ed81c211c89d1fe7bbffd39e4a80d6438a37092295fb703aa414530cdc5e2a01395af8b9bf6b826e29e4d67c7b240a8da4d3c42dc628f4195d4c
-
SSDEEP
384:pnmDTThgH72D9APMyN3i94jTO0fU5QnEDThc/hq6ki2lKxiIiW1sQS+ShjmM6IG7:BEhc8rx0fUQNpF2zInyQS+ST6nkC1
Static task
static1
Behavioral task
behavioral1
Sample
6536e9cdd39ffb3abc509468f74e4620dc40ee10a4d0b07c64d8b513455d6c68.exe
Resource
win7-20241023-en
Malware Config
Extracted
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
6RLYuUCIH8hN
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
6RLYuUCIH8hN - Email To:
[email protected]
Targets
-
-
Target
6536e9cdd39ffb3abc509468f74e4620dc40ee10a4d0b07c64d8b513455d6c68
-
Size
44KB
-
MD5
5f499b57da7faffbcbaccc5e8d3d2833
-
SHA1
9e4fdec1ab203524507562bdf3a9e89ed0325fa5
-
SHA256
6536e9cdd39ffb3abc509468f74e4620dc40ee10a4d0b07c64d8b513455d6c68
-
SHA512
82198722dd54ed81c211c89d1fe7bbffd39e4a80d6438a37092295fb703aa414530cdc5e2a01395af8b9bf6b826e29e4d67c7b240a8da4d3c42dc628f4195d4c
-
SSDEEP
384:pnmDTThgH72D9APMyN3i94jTO0fU5QnEDThc/hq6ki2lKxiIiW1sQS+ShjmM6IG7:BEhc8rx0fUQNpF2zInyQS+ST6nkC1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-