General
-
Target
1fd944afc5fbcea802725291874169d93bf8c38317c20f2b088343a177e06499
-
Size
533KB
-
Sample
220415-bgm1dsagc9
-
MD5
d798664cee72c14f64667fb9a2453945
-
SHA1
77c8bc80447612eb309a46191a512fac392d1b1b
-
SHA256
1fd944afc5fbcea802725291874169d93bf8c38317c20f2b088343a177e06499
-
SHA512
0a0922e097d1491deaa2e957ebc14cdf87155037df5290ee1469d5057e31c0517d7b3f9f8e76b63e036ce232679a4dc7218c5f1642279bc501ba5435a2978dc1
Static task
static1
Behavioral task
behavioral1
Sample
1fd944afc5fbcea802725291874169d93bf8c38317c20f2b088343a177e06499.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1fd944afc5fbcea802725291874169d93bf8c38317c20f2b088343a177e06499.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.wowwow.com.sg - Port:
587 - Username:
[email protected] - Password:
$$wow_5405* - Email To:
[email protected]
Targets
-
-
Target
1fd944afc5fbcea802725291874169d93bf8c38317c20f2b088343a177e06499
-
Size
533KB
-
MD5
d798664cee72c14f64667fb9a2453945
-
SHA1
77c8bc80447612eb309a46191a512fac392d1b1b
-
SHA256
1fd944afc5fbcea802725291874169d93bf8c38317c20f2b088343a177e06499
-
SHA512
0a0922e097d1491deaa2e957ebc14cdf87155037df5290ee1469d5057e31c0517d7b3f9f8e76b63e036ce232679a4dc7218c5f1642279bc501ba5435a2978dc1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-