General
-
Target
b689c5cb896835c4a6a3bbe33129dd37.bin
-
Size
1.2MB
-
Sample
230308-b46e9add76
-
MD5
009f660e4ed5f4380c40e51b62be5a74
-
SHA1
29edf5f841b09a42dac54f465697ae01de9c2d24
-
SHA256
5cc893fb2e3faa09d682518a49142101fb1c1c75a4d00b6b0315af20d89c19ff
-
SHA512
1c3c5ef5b0023d3e42bd3d79bd6d9c6231084ca950f1afb344cd4543bf219d8924d7d0fe2f197a4c8e79be7586801f8e4b95eba15ab9b74412bbd7ba7fee590f
-
SSDEEP
24576:6k1kL9QDcYw2sj+ZfKIfJkCIKg6K/jO6deiwuQOT:6laDoKVKI6CIKgh/jiOT
Static task
static1
Behavioral task
behavioral1
Sample
62c22196418123be9af8ab9c5a0d6ceac9b966b8ac5c241fa2f59fe64f3dbf50.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
62c22196418123be9af8ab9c5a0d6ceac9b966b8ac5c241fa2f59fe64f3dbf50.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
logxtai.shop - Port:
587 - Username:
[email protected] - Password:
g%=fFsvUUCI* - Email To:
[email protected]
Targets
-
-
Target
62c22196418123be9af8ab9c5a0d6ceac9b966b8ac5c241fa2f59fe64f3dbf50.exe
-
Size
2.5MB
-
MD5
b689c5cb896835c4a6a3bbe33129dd37
-
SHA1
bc28e1905621106085707866a88162c9a867a009
-
SHA256
62c22196418123be9af8ab9c5a0d6ceac9b966b8ac5c241fa2f59fe64f3dbf50
-
SHA512
95d1504adc7b88c287ee72ae975a95e7c64dc9f2eaa58b5706699a1b0131c2284ce820e79c97fa241536608f30813f21dad791df7df6b38064e3c4a5ee69073e
-
SSDEEP
24576:xBrXtw2Irak7ZoNNosz4TztSXXo5pl9YZq2v3ret511WKe++7PXf:X9qNm4T86MejWjTv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-