General
-
Target
17d112c34fe43c8d3506540b98f04e04.bin
-
Size
25KB
-
Sample
240703-bgrctayhnd
-
MD5
24fe131dcb6f4c7fa2d17be780613fe6
-
SHA1
8dec992bf6e35096fd932fbe74ebb74360a95f17
-
SHA256
2559b8cbee0b06ed368190ca92de667a9a6175888a93fb3834ec1f1bb2b64f83
-
SHA512
3fa5c4ce282c840d6c4186e128524ae6eea7ff6e33472441d6dff7782446dacd3c02c7652570de7985cd53b2259a08276610389cacbd623922056bf23c7af1dd
-
SSDEEP
768:mSztEAWy0j5zGDmUjkZ6H2kJ6OMBVJV5/erFAv:ZRWy0hKjkQWO42pAv
Static task
static1
Behavioral task
behavioral1
Sample
PO#VPP240570-11.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PO#VPP240570-11.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cpns2.citechco.net - Port:
587 - Username:
[email protected] - Password:
admin@123A - Email To:
[email protected]
Targets
-
-
Target
PO#VPP240570-11.exe
-
Size
27KB
-
MD5
a672e616588d43b143bb45fc0da7932a
-
SHA1
3946cf8618f8bfbc10a8aea36f8401415b20139e
-
SHA256
668ee22f01a50289688d2dc22f4b1a591e5ee9165ee6963b724c506f4244105b
-
SHA512
cd792513b93367f6e60256244afc12bb1c78fe97eeae9b78c9534af93822f8a83c9537d335c5cb198c74f3b3ff1ed72158b2ea7367d3d9cadb88c53b20107ed5
-
SSDEEP
768:IFjxqS8T9Txy9ZCoojXAD5MeEsw8PfgGqpIS:IFjm9TMxCYIGqpP
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-