General
-
Target
q00pH8HBD8KqHjJ.exe
-
Size
877KB
-
Sample
221008-q4sxgsegg9
-
MD5
c422624cc640de25e3292430c4bbbac0
-
SHA1
5e1b530f4dfd07ed973202c9ca029b4439ccc7ef
-
SHA256
23e455928e180012c11d6badfd0959df2fdb57f10d9ce564fe2834e59a67ea77
-
SHA512
423b7fb78495249a4ca94429f9ab805b0e0fafc95324a5c473cc2bf71b11e7cbc6590d8c9abc5459356382a07f11f1d8f12e8260799eb710e5418f8f21d877fd
-
SSDEEP
12288:b/A7dSAoNgyHPrG7stqidc8XJNYjuk3AqjJ5nXt:eHyHPrG7uPdcu+Kk3TjrXt
Static task
static1
Behavioral task
behavioral1
Sample
q00pH8HBD8KqHjJ.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
q00pH8HBD8KqHjJ.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
host12.registrar-servers.com - Port:
587 - Username:
[email protected] - Password:
paymentsuccessful@2022
Targets
-
-
Target
q00pH8HBD8KqHjJ.exe
-
Size
877KB
-
MD5
c422624cc640de25e3292430c4bbbac0
-
SHA1
5e1b530f4dfd07ed973202c9ca029b4439ccc7ef
-
SHA256
23e455928e180012c11d6badfd0959df2fdb57f10d9ce564fe2834e59a67ea77
-
SHA512
423b7fb78495249a4ca94429f9ab805b0e0fafc95324a5c473cc2bf71b11e7cbc6590d8c9abc5459356382a07f11f1d8f12e8260799eb710e5418f8f21d877fd
-
SSDEEP
12288:b/A7dSAoNgyHPrG7stqidc8XJNYjuk3AqjJ5nXt:eHyHPrG7uPdcu+Kk3TjrXt
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-