General
-
Target
FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe
-
Size
5.2MB
-
Sample
220724-mty4zacgbm
-
MD5
f7389b83ba7eaedeae31eda31412db06
-
SHA1
ccfd2e456ccf2c8cc24942797805ad4d15a6d860
-
SHA256
ffd551a66208b73cee933fc4e27c449b8eabb0acb0fe27ad251844e2fb8821d1
-
SHA512
ac7f8ef5e4736e6fcb0f54c88761095dbcb09cec44d35b1efcfb7cbc03341049fc55410ad49925399ea8e56ea02d5c1ad1c20fb4c344d3027fbb7873f45aa4a9
Static task
static1
Behavioral task
behavioral1
Sample
FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
157.230.124.151 - Port:
587 - Username:
[email protected] - Password:
chichi001
Targets
-
-
Target
FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe
-
Size
5.2MB
-
MD5
f7389b83ba7eaedeae31eda31412db06
-
SHA1
ccfd2e456ccf2c8cc24942797805ad4d15a6d860
-
SHA256
ffd551a66208b73cee933fc4e27c449b8eabb0acb0fe27ad251844e2fb8821d1
-
SHA512
ac7f8ef5e4736e6fcb0f54c88761095dbcb09cec44d35b1efcfb7cbc03341049fc55410ad49925399ea8e56ea02d5c1ad1c20fb4c344d3027fbb7873f45aa4a9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
NetWire RAT payload
-
AgentTesla payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-