General
-
Target
d975348bc9e2938f9bbb8f8c96f20cbc74c0241ef9e0847a853233fd962f73fa
-
Size
944KB
-
Sample
230306-1kw5xafa27
-
MD5
0ad5f09b242a0606e12c70df87b60e20
-
SHA1
0ffac097abdb16b4c8e7dc83ac1e63de46233b3c
-
SHA256
d975348bc9e2938f9bbb8f8c96f20cbc74c0241ef9e0847a853233fd962f73fa
-
SHA512
afd72efc7019b90e247e6ab5afea168c8082375f3fe69f29b2a203c0f6f648a3e19569efc68a7ced438205f831fc0e8cfcf4b4299c0fa958c9e6334a87b6a8c0
-
SSDEEP
24576:GOnD9hh7bnab+5/mEYsrgtVS719y4UPe1DutEySDDqFcIEPR/PsG:Fz3cEB
Static task
static1
Behavioral task
behavioral1
Sample
d975348bc9e2938f9bbb8f8c96f20cbc74c0241ef9e0847a853233fd962f73fa.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d975348bc9e2938f9bbb8f8c96f20cbc74c0241ef9e0847a853233fd962f73fa.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gonnamokgroup.org - Port:
587 - Username:
[email protected] - Password:
Gonnamok2018! - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.gonnamokgroup.org - Port:
587 - Username:
[email protected] - Password:
Gonnamok2018!
Targets
-
-
Target
d975348bc9e2938f9bbb8f8c96f20cbc74c0241ef9e0847a853233fd962f73fa
-
Size
944KB
-
MD5
0ad5f09b242a0606e12c70df87b60e20
-
SHA1
0ffac097abdb16b4c8e7dc83ac1e63de46233b3c
-
SHA256
d975348bc9e2938f9bbb8f8c96f20cbc74c0241ef9e0847a853233fd962f73fa
-
SHA512
afd72efc7019b90e247e6ab5afea168c8082375f3fe69f29b2a203c0f6f648a3e19569efc68a7ced438205f831fc0e8cfcf4b4299c0fa958c9e6334a87b6a8c0
-
SSDEEP
24576:GOnD9hh7bnab+5/mEYsrgtVS719y4UPe1DutEySDDqFcIEPR/PsG:Fz3cEB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-