General
-
Target
PO 4500022412.r15.rar
-
Size
13KB
-
Sample
230203-rqp44sff88
-
MD5
d0b5157a6912bb9e22bcee4a62795fdc
-
SHA1
2bbe7f83485ae00a13d25adc60609d84740b6172
-
SHA256
4b2fb9cf30f2decd8a519fe93881ff94b368f69c87570060133201ed4925d193
-
SHA512
4d89dbd08431a673ef713647eb2b2258c6857057da41a19db1f6f9a60664a9f470b373d629505aeceb0efada219143891eae806960c59a80685bda566356bf6d
-
SSDEEP
384:JTX+nJN2sJxxzIuSL+cUvVkDTIpo7LFiPU/:JTWRJH7SyDyDT2qV
Static task
static1
Behavioral task
behavioral1
Sample
PO 4500022412.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
PO 4500022412.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aficofilters.com.eg - Port:
587 - Username:
[email protected] - Password:
mhds@852 - Email To:
[email protected]
Targets
-
-
Target
PO 4500022412.exe
-
Size
37KB
-
MD5
78f270cbab89f32c355f1b9354e74a17
-
SHA1
ff6eb90ea94ce75c0cfdf1c5c967c41e1f467093
-
SHA256
3a0a9c9d17e7d5ab347cf05ec50ea6a758b966859e218ed36a95eefc9a5eff2d
-
SHA512
29d5394d7cb67a6892c217c724454a66efefcdcc0b22e91ac120956ef196066635ebc76d04c141e85eb068f4ec5e9cecc15510e7e2e1ccd5575f3915a7aef69e
-
SSDEEP
768:tevPNqfe1TxGW+t12vXOguVQt+hEqt5RYVMb824v:ONqm1T4W+t1eXVsw+CqtfYE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-