General
-
Target
PO#1132 &1133.zip
-
Size
436KB
-
Sample
221123-kba83scb8v
-
MD5
1333bd7165d7d01913edd4c7ebc866f6
-
SHA1
0d121c8ce141b4734ccb930b043066fc0c78a7f6
-
SHA256
d2a14337d5114e189e91736aaaa069410cfae88d3c75c77618c9a7fa2418109a
-
SHA512
78cbdecbb4d1d9ac726016199c669aa41ebc38ea1ed5ae68f15ea05456f19ead8508fddb753aed067e09672137ae14fffa3de0c2962b8787d74d353fe1cdbb6d
-
SSDEEP
12288:VW/2nuZ5SSPcPRy7aP1+7xsQRTKC5yvio1f61HyQ+:o/zZVcPRy7aPQ7xsQRKC54FQ1K
Static task
static1
Behavioral task
behavioral1
Sample
PO#1132 &1133.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
PO#1132 &1133.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.strictfacilityservices.com - Port:
587 - Username:
[email protected] - Password:
SFS!@#321 - Email To:
[email protected]
Targets
-
-
Target
PO#1132 &1133.exe
-
Size
500KB
-
MD5
66025ac6fd60f45bbeac781a6dd87b0d
-
SHA1
c18b50db3c100d0adbc7a60530e515eb35483389
-
SHA256
788c228ea56724227e6eb18a04d36fa4eda9dcfd5a90f1131a54f01ce7445a48
-
SHA512
14aacfd10e247eca000671364a37de573ec9dc98cd18758a7809a0adb0a9d96df1ebb2d5fd54695cd48fcaed9388eff33a8a50c539cc0576baf734a0a96e6b53
-
SSDEEP
12288:EW9ABfUnsuZbSSPcLRy70P5+7xsQRTK05+UL/QT3Z7i:EW9uUfZ/cLRy70PU7xsQRK05o7l
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-