General
-
Target
CONTRACT #683793.zip
-
Size
554KB
-
Sample
221129-qmsv6acg22
-
MD5
b61760cb4b69f16c8d61038b66951c94
-
SHA1
5f234efdc75e71481544f6ebb1ca71ec7fd06ac1
-
SHA256
8300fc191dc84113aa07ca36cb22a14dd257fb8826ca5ddaee8cc6323aa4cd40
-
SHA512
65e340b6595a144b56d27705cc7e8de58dcba2f34df77c6e6bf3b4691318d8f5cd85e5c66bbc8e3c718b7d95b54eaf8d92b7f3cacc4183afd76b18aac0fc7537
-
SSDEEP
12288:P3zi+iJJc+XiOXrq7gRCIi97ZagoxSuhnlYaAEtCucH8r0Yv9OledW:PBinc+XiOXrqwkcLH9AACucHkqle0
Static task
static1
Behavioral task
behavioral1
Sample
CONTRACT #683793.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
CONTRACT #683793.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.southernboilers.org - Port:
587 - Username:
[email protected] - Password:
Sksmoke2018# - Email To:
[email protected]
Targets
-
-
Target
CONTRACT #683793.exe
-
Size
668KB
-
MD5
9efabcfe6bfbfa5dda90ad4dc5894040
-
SHA1
07c7cdac9aa0658d374331c4b35a9d0190eadbee
-
SHA256
05472a071f902b974d4ce0d2e605058580f86ab1ad7b6c201c6f9b38608c9b4d
-
SHA512
bae5eb2fb1dcb683ccab5b4c5f6857ffe300b1719378050e5aab1f97e0c748dbbb5abe91b32cbe8aea3615069f0903a376310ad68ad4ad60d80f1933100e0855
-
SSDEEP
12288:wFkzrbETClCHskFgFwIyXCDP0SLZigmxSuhnlYiAEt+Ccf8r2Yt93cr:Z76CIskFgqIyXyLOLHbAA+Ccfkg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-