General
-
Target
b709fac7630fa728c21d189818663b2c1459f8881f8674c06dbe300d437b9b07
-
Size
891KB
-
Sample
220414-qzsqxsbbam
-
MD5
279794744b9f022ebe655c791a8e1578
-
SHA1
e45225509f5cafa7add2b6702840fc356a422ba0
-
SHA256
b709fac7630fa728c21d189818663b2c1459f8881f8674c06dbe300d437b9b07
-
SHA512
ad5091feee766f15a49de75dad3c74dced10b8c7e3d574e16a04f815939feb20e058fe4e8ee51733f172d75d83939d0499999d3a69ddb430dc4abbf26b702e4b
Static task
static1
Behavioral task
behavioral1
Sample
b709fac7630fa728c21d189818663b2c1459f8881f8674c06dbe300d437b9b07.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
b709fac7630fa728c21d189818663b2c1459f8881f8674c06dbe300d437b9b07.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
t$KMOPJ9
Targets
-
-
Target
b709fac7630fa728c21d189818663b2c1459f8881f8674c06dbe300d437b9b07
-
Size
891KB
-
MD5
279794744b9f022ebe655c791a8e1578
-
SHA1
e45225509f5cafa7add2b6702840fc356a422ba0
-
SHA256
b709fac7630fa728c21d189818663b2c1459f8881f8674c06dbe300d437b9b07
-
SHA512
ad5091feee766f15a49de75dad3c74dced10b8c7e3d574e16a04f815939feb20e058fe4e8ee51733f172d75d83939d0499999d3a69ddb430dc4abbf26b702e4b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-