General
-
Target
PI#102087.zip
-
Size
543KB
-
Sample
221125-hdggrsca9s
-
MD5
6ea9b27bf7bc0c6ded6267fdd7eabfd3
-
SHA1
863574e51a670988be3075b221d548b2e045e585
-
SHA256
e0de15aa0a50a7d2b5032198743c13e8b66118949a18f93f685786b37b7eb4e3
-
SHA512
06f09aa697bce899cfc8b2d0d5dcb1f9654f2eab58fa99156a418e1e652454c6c70bd0291bb1555eeeeeb850023f0e10a2c020176c54e0d39c5a10439a236a69
-
SSDEEP
12288:PTd0mBeouIVkCla2mFx+6ZW+rVRSmMywOQk77AsWCFrZO8r55U9sm07BeV/:bOmBeoICr8x+qPvhksRxZJbU9sm07EV
Static task
static1
Behavioral task
behavioral1
Sample
PI#102087.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
PI#102087.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.strictfacilityservices.com - Port:
587 - Username:
[email protected] - Password:
SFS!@#321 - Email To:
[email protected]
Targets
-
-
Target
PI#102087.exe
-
Size
651KB
-
MD5
505852f2cd67a14131d2d6e927d92889
-
SHA1
a7062897a84533c30705eb6667d352c78a43b9f6
-
SHA256
8e6fe812e3f4a19a51a0978e9c47e2cdb891f1feecb0a7ae2c1eff744c971371
-
SHA512
49709821545b0fb4e7c12ebee2382258def6f5ad9025c91d1ce28bd02b961d8f7c0aed47d2d1a866d5636643d9f13e5a561c872e06e758af2f2f148180bd7585
-
SSDEEP
12288:sFTYIvM3zrbETClyHskFgFwIyXCDmVRSmMSwOQkL7AiGSdrZOOP55U9smC7B4s:6dU376CoskFgqIyXxv/kiPpZFbU9smCr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-