General
-
Target
BBKU39-2022-KTC.zip
-
Size
627KB
-
Sample
221129-qmsv6acg24
-
MD5
91e0636f65e4dde99d37c5276405af6b
-
SHA1
c9d953be3629d7a1c56e4efb965f18c0ff892594
-
SHA256
737f03e35542b3a800dd08a5b9aa2b410132a31e9f1bbb0174552345f77a3749
-
SHA512
9af2f97a12a8a6d51f1af10d8d0e3c7c91f530bd514e834ba04ac65d4c0a42378ef01cf535332a37651615d3af317a01a5c2c736588e0116cb6550ba750b0d94
-
SSDEEP
12288:6XFuld2ZE+5+2Ga3eL+605H0U6TNDrUwStW5TCvS+/giRHWUy2g:6XFod2ZD5+za3m0W7TxovMpCvh/9JY
Static task
static1
Behavioral task
behavioral1
Sample
BBKU39-2022-KTC.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
BBKU39-2022-KTC.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.strictfacilityservices.com - Port:
587 - Username:
accounts@strictfacilityservices.com - Password:
SFS!@#321 - Email To:
guc850155@gmail.com
Targets
-
-
Target
BBKU39-2022-KTC.exe
-
Size
789KB
-
MD5
72c17e8d702de79f794fe16787a61098
-
SHA1
18f51344f688db3979c55a6322f013269b4c308d
-
SHA256
4513951a7d2bdb62b062c790f0c259d9f5854497b6e5e8ed0369d22197d1e856
-
SHA512
09ca148f810649989cb89507848de48d55738f79bc301e4a7c8b2f3b52bc231b59aa79c15be126eb7c41a2d8801279792eb21a262b45e0503a8c93eca26fec43
-
SSDEEP
12288:OKdsCbFr5cE8LHWy/SEdRMA/LyzIPPPu6gtFNDzUwSzWbTgvS6/IiTHWcb:7ovLB9/LkInstFxQvCngv5/1db
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-