General
-
Target
79092f23a261bfbeb3398707d48c1e5c230517d5258d3b82477450484a925577
-
Size
389KB
-
Sample
220521-n5wnnaefe8
-
MD5
761a684e09f699bd8e130107a615acdd
-
SHA1
ae8d934c8b10b796a73edb294518942e36b1bb18
-
SHA256
79092f23a261bfbeb3398707d48c1e5c230517d5258d3b82477450484a925577
-
SHA512
21b6460edbfb2551910188c7230de9771a9c0a9bc55275884e7ad3c0dcbd212f998de7e85593e91740fd9ff8c639628bcc8ddec537de8c10e29f04a7a283d067
Static task
static1
Behavioral task
behavioral1
Sample
IMG_0009786R445TGUH.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
IMG_0009786R445TGUH.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
mkoify147@@@
Targets
-
-
Target
IMG_0009786R445TGUH.exe
-
Size
423KB
-
MD5
f6cec1316813848e64a78fe3d6d29386
-
SHA1
ee1422deba8ead728f95c22c2b0ccfb984c00c33
-
SHA256
2b9ac04e330dd1d57544561da42bd8826c516e16b1acb6e70aa07d38f8152cde
-
SHA512
174e73448b7a1d9002deb0957c33e5939601ba0c79038f33d00e16bf0548ffdbd0165754d52f8b830a517bc499c58e755d6926b902fc02225fbe63e488c208e0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-