General
-
Target
quotation.exe
-
Size
902KB
-
Sample
230330-jdj4bsbe53
-
MD5
2b564516caf1e0e77e93c3d154281f16
-
SHA1
fdb405c650f80a7067d1ae7d33ddbed9d0b27dd1
-
SHA256
f4d76f6893e4996666f0bbb670ad59bfd7201356080b213015621449c0aa2710
-
SHA512
f71f11ea8fb37af46a57f493dc417224960fb2c57870c9669ef83b34c45c633354e5d82b882664f613597f94a46b876acb95e8283e4c96e17ef07e086dab0ac8
-
SSDEEP
12288:nc2TJ+aMCZzHAe2AG7WtrYhhcA9D/4BjDtmABdVefwFCz1IROdFiMSdg7QCLe5ba:nT8YZzHA9Z0rYhkBhd3Fwa0FfSdgfLC
Static task
static1
Behavioral task
behavioral1
Sample
quotation.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
quotation.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aficofilters.com.eg - Port:
587 - Username:
[email protected] - Password:
aml@98513 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.aficofilters.com.eg - Port:
587 - Username:
[email protected] - Password:
aml@98513
Targets
-
-
Target
quotation.exe
-
Size
902KB
-
MD5
2b564516caf1e0e77e93c3d154281f16
-
SHA1
fdb405c650f80a7067d1ae7d33ddbed9d0b27dd1
-
SHA256
f4d76f6893e4996666f0bbb670ad59bfd7201356080b213015621449c0aa2710
-
SHA512
f71f11ea8fb37af46a57f493dc417224960fb2c57870c9669ef83b34c45c633354e5d82b882664f613597f94a46b876acb95e8283e4c96e17ef07e086dab0ac8
-
SSDEEP
12288:nc2TJ+aMCZzHAe2AG7WtrYhhcA9D/4BjDtmABdVefwFCz1IROdFiMSdg7QCLe5ba:nT8YZzHA9Z0rYhkBhd3Fwa0FfSdgfLC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-