General
-
Target
PO-000161.exe
-
Size
870KB
-
Sample
221207-rgp3raac4t
-
MD5
909b1743dc6e451ab7db216f26b52bde
-
SHA1
7153ad37069cc0b9fc26b59f3e4e479916c72584
-
SHA256
e8a5765337996b5641061728075dc4432dc4809ca48e25d624f63e33962cbef7
-
SHA512
331adcc0f7bb9826d21f084b69a51291c8414a49d087d2e63564c555f69c53f1a6ecaa0e8eefda4c864866e7b7561ceb4bd165364cd67694e1f3fa2e534b3996
-
SSDEEP
12288:coQgKZ/nXt7virmWhlGLaQYIOjGBhYMMobm1SN70v1GyxaW4bgIp9q6oyu8WmJd:RjGBhYMMosE7w1OW4b4mu8Hawu
Static task
static1
Behavioral task
behavioral1
Sample
PO-000161.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
PO-000161.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.animaledzoocation.com - Port:
587 - Username:
[email protected] - Password:
777Snakes - Email To:
[email protected]
Targets
-
-
Target
PO-000161.exe
-
Size
870KB
-
MD5
909b1743dc6e451ab7db216f26b52bde
-
SHA1
7153ad37069cc0b9fc26b59f3e4e479916c72584
-
SHA256
e8a5765337996b5641061728075dc4432dc4809ca48e25d624f63e33962cbef7
-
SHA512
331adcc0f7bb9826d21f084b69a51291c8414a49d087d2e63564c555f69c53f1a6ecaa0e8eefda4c864866e7b7561ceb4bd165364cd67694e1f3fa2e534b3996
-
SSDEEP
12288:coQgKZ/nXt7virmWhlGLaQYIOjGBhYMMobm1SN70v1GyxaW4bgIp9q6oyu8WmJd:RjGBhYMMosE7w1OW4b4mu8Hawu
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-