General
-
Target
stage5.bin.exe
-
Size
979KB
-
Sample
230330-h7s3nada21
-
MD5
2acd19884dc08535b643868f682b3c84
-
SHA1
c3577aea750eae81c5ea828633cd523f28979b26
-
SHA256
93d4a1c73f73cfabff4180c6b5ce9991b3cb41783440f29dc5745961741eefe7
-
SHA512
7d0565d00795f9f6f37cf7a3a65f1c3be1ca4ae2249c67617d2bb31c8b820b593b3e1d96ea173aa4ffd8d72a569c3432ae3f9f80c799f53049d966e570dc0dc8
-
SSDEEP
24576:d4PpyeFskkfO+Ucf/eHAzoAgWdFMkLUvHW7kX3Lu4:ZpHwMegXnzLy27kru
Static task
static1
Behavioral task
behavioral1
Sample
stage5.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
stage5.bin.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mewa.or.ke - Port:
587 - Username:
[email protected] - Password:
pharmacy@2017 - Email To:
[email protected]
Targets
-
-
Target
stage5.bin.exe
-
Size
979KB
-
MD5
2acd19884dc08535b643868f682b3c84
-
SHA1
c3577aea750eae81c5ea828633cd523f28979b26
-
SHA256
93d4a1c73f73cfabff4180c6b5ce9991b3cb41783440f29dc5745961741eefe7
-
SHA512
7d0565d00795f9f6f37cf7a3a65f1c3be1ca4ae2249c67617d2bb31c8b820b593b3e1d96ea173aa4ffd8d72a569c3432ae3f9f80c799f53049d966e570dc0dc8
-
SSDEEP
24576:d4PpyeFskkfO+Ucf/eHAzoAgWdFMkLUvHW7kX3Lu4:ZpHwMegXnzLy27kru
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-