General
-
Target
SCANNED COPY.zip
-
Size
667KB
-
Sample
221220-kd6g1aha82
-
MD5
16bbfb9b8df5e1046a2ba28ebf870f61
-
SHA1
cfd0a928725f01052d49fd703932330d2a0df46c
-
SHA256
69153f4c0fa2fb13a384e185416154a7ef687a7dac3bceeb3df1df59a2cbeb45
-
SHA512
e0b5a97914a1f2341cf8650967906ebbd9077975ca563ad37e8ed7e8beaf2d2e435fc46e54b2de981120a831fb1f431439d4f80c540a64843910ecfc898fc767
-
SSDEEP
12288:uOMpPkJc01BCozIkwhzMuN8RkDfpDa1aa6qRTiO8ia2JQdyzuvBcO7rXZ0vIBQHL:uRp/0Sok38OD0iHUJAyKC67ZU4G
Static task
static1
Behavioral task
behavioral1
Sample
SCANNED COPY.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SCANNED COPY.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.southernboilers.org - Port:
587 - Username:
[email protected] - Password:
Sksmoke2018# - Email To:
[email protected]
Targets
-
-
Target
SCANNED COPY.exe
-
Size
1021KB
-
MD5
f81005ba703fb34476ce879d75ec5ab8
-
SHA1
dd61ce1cdd440dd8a09c039f4729ade2970ba875
-
SHA256
708854bca2cd2ab2e484b373b82e18a23cb0c0bfd89c4fa6f9ec9b6ee406e4bc
-
SHA512
a1754b9dcb9b0a3339483aa7deda203073bb1c2644c6078e4537a796c605eafa98c86a5a8ed9b6c206ad9d1a54ddf30b6ff8b4a1b09ccbfc2577c47243287e1f
-
SSDEEP
12288:jCrehz4X2iNXYoJkwhTMuN8XYDjpVa1Sa6qRTYc8CaSO3PcifOAKjgXZQky:jCrCz4X15v8oDyWZh3PBlKjaZ+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-