General
-
Target
SOA.exe
-
Size
1.2MB
-
Sample
220912-qznrzaddb3
-
MD5
7e5d9740e83ece275973489fb98c96b9
-
SHA1
dae8b772295432b0a7662ceaf7d761c095333c8d
-
SHA256
f7eebf4796c315e16c8504bcec7d3fcadea8f998de9de3e28515671844ed1ec4
-
SHA512
457c3eeef8398de6621c0519661af6da98824f17b68786ba4cafd4eb7a82aac0192d1a11e3796800bcf87a7f61a54fb63cb7b15385fa992f4745a341ef9ec9e3
-
SSDEEP
24576:GTnvFkhLuyyjckTHWuUY2kdbepZVZIV4P9+k:iuLuyyjcbOD8TZ84
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.hindusthan.com - Port:
587 - Username:
[email protected] - Password:
f1o2m3
Extracted
agenttesla
Protocol: smtp- Host:
mail.hindusthan.com - Port:
587 - Username:
[email protected] - Password:
f1o2m3 - Email To:
[email protected]
Targets
-
-
Target
SOA.exe
-
Size
1.2MB
-
MD5
7e5d9740e83ece275973489fb98c96b9
-
SHA1
dae8b772295432b0a7662ceaf7d761c095333c8d
-
SHA256
f7eebf4796c315e16c8504bcec7d3fcadea8f998de9de3e28515671844ed1ec4
-
SHA512
457c3eeef8398de6621c0519661af6da98824f17b68786ba4cafd4eb7a82aac0192d1a11e3796800bcf87a7f61a54fb63cb7b15385fa992f4745a341ef9ec9e3
-
SSDEEP
24576:GTnvFkhLuyyjckTHWuUY2kdbepZVZIV4P9+k:iuLuyyjcbOD8TZ84
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-