General
-
Target
10bbdcba6103c198c34c0549547f24382238e4e3e8940937596ff0488d7a55db.exe
-
Size
814KB
-
Sample
230106-nyfnvsfh59
-
MD5
ccb25567d39138d73ef8eb766ee64373
-
SHA1
656b7df241748c2dd3482475918c91a625ad8f90
-
SHA256
10bbdcba6103c198c34c0549547f24382238e4e3e8940937596ff0488d7a55db
-
SHA512
fc934cd4b101f973f92636a3d23fbeda023933f3c46e01422ff3cd3eaa116cea79044235024bf79b769d4d29cccb5c5d3fea690f890202af3509d1a7641c0030
-
SSDEEP
24576:BdxrcQ3jPQSrVQxjqRbgQTqS21EiPtUxzjW:SmD5On1EiPtUxm
Static task
static1
Behavioral task
behavioral1
Sample
10bbdcba6103c198c34c0549547f24382238e4e3e8940937596ff0488d7a55db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
10bbdcba6103c198c34c0549547f24382238e4e3e8940937596ff0488d7a55db.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Da8@b!Gj!#zY4K
Targets
-
-
Target
10bbdcba6103c198c34c0549547f24382238e4e3e8940937596ff0488d7a55db.exe
-
Size
814KB
-
MD5
ccb25567d39138d73ef8eb766ee64373
-
SHA1
656b7df241748c2dd3482475918c91a625ad8f90
-
SHA256
10bbdcba6103c198c34c0549547f24382238e4e3e8940937596ff0488d7a55db
-
SHA512
fc934cd4b101f973f92636a3d23fbeda023933f3c46e01422ff3cd3eaa116cea79044235024bf79b769d4d29cccb5c5d3fea690f890202af3509d1a7641c0030
-
SSDEEP
24576:BdxrcQ3jPQSrVQxjqRbgQTqS21EiPtUxzjW:SmD5On1EiPtUxm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-