General
-
Target
4219085.exe
-
Size
793KB
-
Sample
220316-gvxdwagbfp
-
MD5
0dacbb28cef175c1e01560fe18e3ee70
-
SHA1
61b84862a70a43ef54ffe00b8c15cb192e9d79a8
-
SHA256
9dbaa30f9fbccd0821c136557992a8dfa6e1c92af89aa637807f18db7a7e7f78
-
SHA512
38abff21af4afd5939da8f7332169d665b47a57e0fd7357716d1ea942868e260878f51312ff22c216f071c5d5cdcb92ab80e6acc7c2df77e98300c62c4df29db
Static task
static1
Behavioral task
behavioral1
Sample
4219085.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
4219085.exe
Resource
win10v2004-20220310-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.escueladeseguridadmaritima.com - Port:
587 - Username:
[email protected] - Password:
JUsatelite2020
Targets
-
-
Target
4219085.exe
-
Size
793KB
-
MD5
0dacbb28cef175c1e01560fe18e3ee70
-
SHA1
61b84862a70a43ef54ffe00b8c15cb192e9d79a8
-
SHA256
9dbaa30f9fbccd0821c136557992a8dfa6e1c92af89aa637807f18db7a7e7f78
-
SHA512
38abff21af4afd5939da8f7332169d665b47a57e0fd7357716d1ea942868e260878f51312ff22c216f071c5d5cdcb92ab80e6acc7c2df77e98300c62c4df29db
Score10/10-
suricata: ET MALWARE AgentTesla Exfil Via SMTP
suricata: ET MALWARE AgentTesla Exfil Via SMTP
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-