General
-
Target
8a63505049130bf84c31e4f1e24ab74f57c32df1e45c7cec259fedd714337f6b
-
Size
374KB
-
Sample
250129-bl6naswnhx
-
MD5
34e4b2dc3e253c3318a61ee454d3325e
-
SHA1
4b8aa68044d7e51004dff323bdfc5a113262769e
-
SHA256
8a63505049130bf84c31e4f1e24ab74f57c32df1e45c7cec259fedd714337f6b
-
SHA512
17e54a6da93f44a8af82aed96f05bd664844b0f2c03c595d0d8e065afd2bb715b7dde57aa640c21122508d6bcd6da6148905929fede4d0ce4f0320251b26c703
-
SSDEEP
6144:spTSHymMSVS6K2gAuExLrONMrF3u/CvoYy2UjStAQRIjuxmHuNHFIr1:F3SEVrONMrtkLjQRwc3u
Static task
static1
Behavioral task
behavioral1
Sample
8a63505049130bf84c31e4f1e24ab74f57c32df1e45c7cec259fedd714337f6b.exe
Resource
win7-20240708-en
Malware Config
Extracted
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
6RLYuUCIH8hN
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
6RLYuUCIH8hN - Email To:
[email protected]
Targets
-
-
Target
8a63505049130bf84c31e4f1e24ab74f57c32df1e45c7cec259fedd714337f6b
-
Size
374KB
-
MD5
34e4b2dc3e253c3318a61ee454d3325e
-
SHA1
4b8aa68044d7e51004dff323bdfc5a113262769e
-
SHA256
8a63505049130bf84c31e4f1e24ab74f57c32df1e45c7cec259fedd714337f6b
-
SHA512
17e54a6da93f44a8af82aed96f05bd664844b0f2c03c595d0d8e065afd2bb715b7dde57aa640c21122508d6bcd6da6148905929fede4d0ce4f0320251b26c703
-
SSDEEP
6144:spTSHymMSVS6K2gAuExLrONMrF3u/CvoYy2UjStAQRIjuxmHuNHFIr1:F3SEVrONMrtkLjQRwc3u
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-