General
-
Target
Offer#129733.zip
-
Size
436KB
-
Sample
221123-kba83scb8t
-
MD5
88d21c204eea8a1932fa37f06f2933b1
-
SHA1
519c23c59a506c5e63b366c59d1fe66e8c47b2e1
-
SHA256
752e3bf8736d97adb3c892f1b4b75175788a005ef1a63e248b1d083af0bcfa16
-
SHA512
ef81de3a29d3f88b93c9709660b4edf930de6ef4c7f8f6926942883c7cfd146a39071af10df1b3f259bb24fdeafaf91cb0d05d1eb3bfd7577a76abbffa8dc189
-
SSDEEP
12288:dW/2nuZ5SSPcPRy7aP1+7xsQRTKC5yvio1f61HyQl:Q/zZVcPRy7aPQ7xsQRKC54FQ1Z
Static task
static1
Behavioral task
behavioral1
Sample
Offer#129733.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Offer#129733.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.strictfacilityservices.com - Port:
587 - Username:
[email protected] - Password:
SFS!@#321 - Email To:
[email protected]
Targets
-
-
Target
Offer#129733.exe
-
Size
500KB
-
MD5
66025ac6fd60f45bbeac781a6dd87b0d
-
SHA1
c18b50db3c100d0adbc7a60530e515eb35483389
-
SHA256
788c228ea56724227e6eb18a04d36fa4eda9dcfd5a90f1131a54f01ce7445a48
-
SHA512
14aacfd10e247eca000671364a37de573ec9dc98cd18758a7809a0adb0a9d96df1ebb2d5fd54695cd48fcaed9388eff33a8a50c539cc0576baf734a0a96e6b53
-
SSDEEP
12288:EW9ABfUnsuZbSSPcLRy70P5+7xsQRTK05+UL/QT3Z7i:EW9uUfZ/cLRy70PU7xsQRK05o7l
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-