General
-
Target
c5b473122b5ec75934213b8a425f168c924f3b4280f58bff452f5e135c79f3ef
-
Size
966KB
-
Sample
221130-p4xp1abh54
-
MD5
f680cc7dbd073f135b1000fa9221c1a3
-
SHA1
5dcc545fc1575a700b9b47084a70722c18d7e508
-
SHA256
c5b473122b5ec75934213b8a425f168c924f3b4280f58bff452f5e135c79f3ef
-
SHA512
88711a963462f8e437e03e7ad786bff9b1635b8c8a89abebf82d1a255d24906b738dab53a0bd8e4ed5a9d9085f6ef350e5f4d44a639ead2ef72cbc2ab8422b61
-
SSDEEP
12288:SpF4WDE6LoMbKAn6wRt+50pt78pUC8an8pUC8a4h1q9g19QQE7sRvp73yHHKCZa6:StoMbKK3Z8N8q1q9gYQE7sh5CnKCZH
Static task
static1
Behavioral task
behavioral1
Sample
c5b473122b5ec75934213b8a425f168c924f3b4280f58bff452f5e135c79f3ef.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c5b473122b5ec75934213b8a425f168c924f3b4280f58bff452f5e135c79f3ef.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
TvNyBPp9212
Targets
-
-
Target
c5b473122b5ec75934213b8a425f168c924f3b4280f58bff452f5e135c79f3ef
-
Size
966KB
-
MD5
f680cc7dbd073f135b1000fa9221c1a3
-
SHA1
5dcc545fc1575a700b9b47084a70722c18d7e508
-
SHA256
c5b473122b5ec75934213b8a425f168c924f3b4280f58bff452f5e135c79f3ef
-
SHA512
88711a963462f8e437e03e7ad786bff9b1635b8c8a89abebf82d1a255d24906b738dab53a0bd8e4ed5a9d9085f6ef350e5f4d44a639ead2ef72cbc2ab8422b61
-
SSDEEP
12288:SpF4WDE6LoMbKAn6wRt+50pt78pUC8an8pUC8a4h1q9g19QQE7sRvp73yHHKCZa6:StoMbKK3Z8N8q1q9gYQE7sh5CnKCZH
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-