General
-
Target
file.exe
-
Size
920KB
-
Sample
230314-tdcpcsgd27
-
MD5
d74f563f4dc5fa8078f14d6a6d3b6dc4
-
SHA1
7f30956ff7830f46f6235865ddb2d3b30801719e
-
SHA256
d6e217e6d822b7db300fbd2df88de22ba5826a9b977b317904abdd40376cf54b
-
SHA512
bf3cb6973af51fa50064d4961699e6b83aa1873693787ff585d9b6ac94156130a953b04e921bd34a7da1f57a97a73d47df434f95111ba2dfd6770f9564e04d50
-
SSDEEP
24576:MnsJ39LyjbJkQFMhmC+6GD9LduEJJMvwZ1:MnsHyjtk2MYC5GDpCvwZ1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.dcmshiram.com - Port:
587 - Username:
[email protected] - Password:
smartyok4#
Targets
-
-
Target
file.exe
-
Size
920KB
-
MD5
d74f563f4dc5fa8078f14d6a6d3b6dc4
-
SHA1
7f30956ff7830f46f6235865ddb2d3b30801719e
-
SHA256
d6e217e6d822b7db300fbd2df88de22ba5826a9b977b317904abdd40376cf54b
-
SHA512
bf3cb6973af51fa50064d4961699e6b83aa1873693787ff585d9b6ac94156130a953b04e921bd34a7da1f57a97a73d47df434f95111ba2dfd6770f9564e04d50
-
SSDEEP
24576:MnsJ39LyjbJkQFMhmC+6GD9LduEJJMvwZ1:MnsHyjtk2MYC5GDpCvwZ1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-