General
-
Target
tmp
-
Size
872KB
-
Sample
230310-zva5rahb5t
-
MD5
6e4c51c65c966531518f3ace3499ade7
-
SHA1
79920fbff850c5a632e0e2b43ff400f13a8a6238
-
SHA256
da56d8f4ee82eaeb593bd5cd320e4d544163c674e26031edb6bd5c409953b2eb
-
SHA512
57915ac32b27a793a98071731140466678316364192d9ab98abdb8bf243f34d47c040b6bd970a1e854c40f2801a134391af44529cbdc6672490bf283d61acabb
-
SSDEEP
12288:9ZGQ4l+T38LYYOyTFW2HqIcUrMQEsVuggBP3ABZbzQLKHdHz0:mQ4S8YzGHGMMQEscggBIBF8KH
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
kV$bSqJ1 daniel - Email To:
[email protected]
Targets
-
-
Target
tmp
-
Size
872KB
-
MD5
6e4c51c65c966531518f3ace3499ade7
-
SHA1
79920fbff850c5a632e0e2b43ff400f13a8a6238
-
SHA256
da56d8f4ee82eaeb593bd5cd320e4d544163c674e26031edb6bd5c409953b2eb
-
SHA512
57915ac32b27a793a98071731140466678316364192d9ab98abdb8bf243f34d47c040b6bd970a1e854c40f2801a134391af44529cbdc6672490bf283d61acabb
-
SSDEEP
12288:9ZGQ4l+T38LYYOyTFW2HqIcUrMQEsVuggBP3ABZbzQLKHdHz0:mQ4S8YzGHGMMQEscggBIBF8KH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-