General
-
Target
b2f402850f42610631640fe2b042ea7c91ef388a0cb6983cf5608207f24f1bb9
-
Size
1.5MB
-
Sample
220520-2arm4sfab6
-
MD5
29cce4a24e13a63fb0bdeb436663bc29
-
SHA1
e0fe103daab2df9b25d37a97c5a63af87592ab6a
-
SHA256
b2f402850f42610631640fe2b042ea7c91ef388a0cb6983cf5608207f24f1bb9
-
SHA512
2f25bb9f7e88807e1074768340eca7458c3dc8f669edaed8a76af279d2267333af1ef98232efc8b37ef940da2ae8ed4d20fc1b988aeee2a778f44d82e02646e0
Static task
static1
Behavioral task
behavioral1
Sample
1049227X.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1049227X.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dogulumetal.com - Port:
587 - Username:
[email protected] - Password:
DMaslak2950**
Targets
-
-
Target
1049227X.EXE
-
Size
953KB
-
MD5
f72f8af5fdc17f1c9c50ae1df1a28b94
-
SHA1
b7a07fb72b972e9ec626ca235ba000481b8334f6
-
SHA256
b7f19729b194bac7f587a7cc19778e925a218fec8106b23466367b2847b99ea2
-
SHA512
aa8aa1ab8a9c8532de65a3816aac651bf3da0433167b209b561ccb3a650d616526226361f2c45cef4f37960331ce6b22d05f58845d576e3fcba3e884c63a163c
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-