General
-
Target
9e13aae5d25df14c8ec998a4298c35c515a399637807ab94ac3cf9eb2b1e9ce9
-
Size
583KB
-
Sample
220521-ab54cacghj
-
MD5
b40948b69eca7f4323f66c55989c14a1
-
SHA1
5eac5f0ea770b37a12ab1283b2ca855f21e98c7f
-
SHA256
9e13aae5d25df14c8ec998a4298c35c515a399637807ab94ac3cf9eb2b1e9ce9
-
SHA512
336e0e7f340a3f27cc9d4bcb6a29f8c4f0f0c85cc8240107ec5016b9209c642b5b02fb0301cbe1cafbeafc2dc5fd1a9e5d9d0c992fe32b55de7ec8e7ff8b08ba
Static task
static1
Behavioral task
behavioral1
Sample
Reference details PO required.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Reference details PO required.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.volivesolutions.com - Port:
587 - Username:
[email protected] - Password:
6@[B*n30b7SH
Extracted
Protocol: smtp- Host:
webmail.volivesolutions.com - Port:
587 - Username:
[email protected] - Password:
6@[B*n30b7SH
Targets
-
-
Target
Reference details PO required.exe
-
Size
750KB
-
MD5
deb8bf5b3dabe802227395612be4b451
-
SHA1
71110e146a14cbf2e878e11375ef9801abb2012a
-
SHA256
7f2bd4e2510a0bbc2d9b47c90aea8d83e4cf42df957f3908628ff22730fd00f6
-
SHA512
4701efaa4c6a5a73108c6ee1642034c9e413d5853e62220d14257e8b2a32bedef50c539aa18335599c8360f6b75dee68919e038dc21b3cf12ccfc4d9e6132ba0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
suricata: ET MALWARE AgentTesla Exfil Via SMTP
suricata: ET MALWARE AgentTesla Exfil Via SMTP
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-