General
-
Target
tmp
-
Size
978KB
-
Sample
230301-p1slwafg4x
-
MD5
f043922d283fb0d35b62d54ec69e4b64
-
SHA1
428067e316fec11cded708e24b12e8882fa3b4b3
-
SHA256
8deb3514b80360ee819cf61e2140c3027a6fb865a18bb3cb5154f90384b0b372
-
SHA512
51f68733801cab01c1c54775c469201516b339ccfd391fc8f2c685b3100cd75de8f8e391eec83c5ee2939368fd7e79731fb55c6da4d1e2628d2ef1d3cbe9bf57
-
SSDEEP
12288:XsfU6RFlmHCxDF3TzFMA7r/gOWROo1FkK6/fipelTL0YMnl7PwtK1gWybr2ay4ek:8M0GijPFMA/cQGn69P9Ml7PzmWy7ILq
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gmpaccl.com - Port:
587 - Username:
[email protected] - Password:
SqD8DeUm7tMWfY9 - Email To:
[email protected]
Targets
-
-
Target
tmp
-
Size
978KB
-
MD5
f043922d283fb0d35b62d54ec69e4b64
-
SHA1
428067e316fec11cded708e24b12e8882fa3b4b3
-
SHA256
8deb3514b80360ee819cf61e2140c3027a6fb865a18bb3cb5154f90384b0b372
-
SHA512
51f68733801cab01c1c54775c469201516b339ccfd391fc8f2c685b3100cd75de8f8e391eec83c5ee2939368fd7e79731fb55c6da4d1e2628d2ef1d3cbe9bf57
-
SSDEEP
12288:XsfU6RFlmHCxDF3TzFMA7r/gOWROo1FkK6/fipelTL0YMnl7PwtK1gWybr2ay4ek:8M0GijPFMA/cQGn69P9Ml7PzmWy7ILq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-