General
-
Target
ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.zip
-
Size
407KB
-
Sample
230321-r5x39sde9x
-
MD5
50a5413e7f25b7b80a8848b8459de002
-
SHA1
d26bfb06d4d08a4b55303638b47be612454d1104
-
SHA256
b692da3929ae4eee45be5df1215158281d8eebd2564747a0c4c5658f345a4879
-
SHA512
655d9b8443bbe2839dcfa528ded7221601231cc5dc26163053b23f4da3e7272487dc4e356b9ed0049f72ba07d44e6aa80976e8a7af1c1a1901f5e91cc3c02f0b
-
SSDEEP
6144:pvNBeovchyk0XlnRkXLvocjg85IYwV071zOxzMN2l3vxF4chmQRXjSxLMHXeDhMv:xpUyk01m/jg8i0QNM+vjzRXjose1w
Static task
static1
Behavioral task
behavioral1
Sample
ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.egyptscientific.com - Port:
587 - Username:
[email protected] - Password:
ibrahim@1234 - Email To:
[email protected]
Extracted
wshrat
http://45.90.222.125:7121
Targets
-
-
Target
ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c.js
-
Size
2.5MB
-
MD5
9175b77d9dc057654b1e8a250bbbac32
-
SHA1
f87919ed7bbc44e3d7e144f5a6a4fa98b977902f
-
SHA256
ce5bd1aa52f3f77592e112958dbaea837cadf8acd005602006dce7a7c59a464c
-
SHA512
06390f1b79616996c17e22ace3daab0cae0f92ee160b44f5ee2d3aa0b2a659879ea964650e6f2603b0677881e30cc2d2ce8c88d83c22dc91a33de17174dd9ec0
-
SSDEEP
6144:sSsZijs7CVe6HBDjrgS+I+fnTSsw4JQtEL9bs+VcuM2dW9otXdxLb3x/vKAOaGAI:fHa+MDq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-