General
-
Target
d33be5280d3218290d388d56c8b24a8384850d562728bbbe6d8a738950f76b89.exe.bin
-
Size
368KB
-
Sample
221209-r3125sgc31
-
MD5
500dbda4403f8f91f0a893c6c57b441d
-
SHA1
dd43960b19cd8810447f45f2e96a1557af36f9d4
-
SHA256
d33be5280d3218290d388d56c8b24a8384850d562728bbbe6d8a738950f76b89
-
SHA512
a76b7cfdf1283db03624b8c73e9aee8b0542e907a5400a0b5b0f4206e937d66a7be9427f36f0191a1ec307b9d22b4d46b4092ca15a0583d3cf322435f4460c23
-
SSDEEP
1536:4doMDP3BnMPUC4wg0p2Z/jrF8wBKYfDHbifFGxsCdnrinleNn:4euPxnMPUHwpp2gBUqwxBNilYn
Static task
static1
Behavioral task
behavioral1
Sample
d33be5280d3218290d388d56c8b24a8384850d562728bbbe6d8a738950f76b89.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d33be5280d3218290d388d56c8b24a8384850d562728bbbe6d8a738950f76b89.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.trinityindustries.ca - Port:
587 - Username:
[email protected] - Password:
aAJ+$ySg+wp0 - Email To:
[email protected]
Targets
-
-
Target
d33be5280d3218290d388d56c8b24a8384850d562728bbbe6d8a738950f76b89.exe.bin
-
Size
368KB
-
MD5
500dbda4403f8f91f0a893c6c57b441d
-
SHA1
dd43960b19cd8810447f45f2e96a1557af36f9d4
-
SHA256
d33be5280d3218290d388d56c8b24a8384850d562728bbbe6d8a738950f76b89
-
SHA512
a76b7cfdf1283db03624b8c73e9aee8b0542e907a5400a0b5b0f4206e937d66a7be9427f36f0191a1ec307b9d22b4d46b4092ca15a0583d3cf322435f4460c23
-
SSDEEP
1536:4doMDP3BnMPUC4wg0p2Z/jrF8wBKYfDHbifFGxsCdnrinleNn:4euPxnMPUHwpp2gBUqwxBNilYn
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-