General
-
Target
395b72299c5bf7155600b796385d06839c60239abd8ac93dc3383100bd75dca2.exe
-
Size
846KB
-
Sample
230105-qy359scb57
-
MD5
c68a796a0096cb46db8fb3e8ad120e6c
-
SHA1
9ecf7ea3b8164f2c428e652f67c5cc2f13b854a6
-
SHA256
395b72299c5bf7155600b796385d06839c60239abd8ac93dc3383100bd75dca2
-
SHA512
cc346b6b3819e77d7747bf60646ad2b8222fa3ea01f5b9e0e299faf088ff3740d7ff62f7f07188960a331739130697b5582bd135ee615894cf34bdef2c81f10b
-
SSDEEP
12288:ZsoQgKZ/nXt7virmWhlGLaQYI4glQ1ivb+jnHAbzeSZ5qTkXoXyD9dmLw5qgls2T:Zi9begbzdZ5Cm2yDDSwUYaO
Static task
static1
Behavioral task
behavioral1
Sample
395b72299c5bf7155600b796385d06839c60239abd8ac93dc3383100bd75dca2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
395b72299c5bf7155600b796385d06839c60239abd8ac93dc3383100bd75dca2.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.crownoffice.xyz - Port:
587 - Username:
[email protected] - Password:
GRACEoverflow123@
Targets
-
-
Target
395b72299c5bf7155600b796385d06839c60239abd8ac93dc3383100bd75dca2.exe
-
Size
846KB
-
MD5
c68a796a0096cb46db8fb3e8ad120e6c
-
SHA1
9ecf7ea3b8164f2c428e652f67c5cc2f13b854a6
-
SHA256
395b72299c5bf7155600b796385d06839c60239abd8ac93dc3383100bd75dca2
-
SHA512
cc346b6b3819e77d7747bf60646ad2b8222fa3ea01f5b9e0e299faf088ff3740d7ff62f7f07188960a331739130697b5582bd135ee615894cf34bdef2c81f10b
-
SSDEEP
12288:ZsoQgKZ/nXt7virmWhlGLaQYI4glQ1ivb+jnHAbzeSZ5qTkXoXyD9dmLw5qgls2T:Zi9begbzdZ5Cm2yDDSwUYaO
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-