General
-
Target
b34b2e21f7689e00f4efbda92e4c3281.bin
-
Size
934KB
-
Sample
230401-b9dx7afb84
-
MD5
dc613258365f4e20b1c0016dba6efc01
-
SHA1
6969dfed4acfb4e7d0dfd8a89fecb19a6dc1c00d
-
SHA256
17906c0cf11038c5651769dcab79c6d0a4dd4172abc34e13d918cc048e77f742
-
SHA512
a6cf2b36010956b3de7b3ff8d60277d40127a3b2862929bc78fa14c9290ee4b8a13df956443908feceec17b2814ef18177b7657ea7fba5595577dcf4dcb9e0e4
-
SSDEEP
24576:21njrT6P3VxJQbOH4A1rPBrhtczVzs0XSvOzjDiFbbQX9ZE8zOlAi5:IjrT6/zJQHA1dvczVwhvwIgX9ZELF
Static task
static1
Behavioral task
behavioral1
Sample
New Catalog and Prices.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
New Catalog and Prices.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
useronelog@gthltd.buzz - Password:
7213575aceACE@# - Email To:
userone@gthltd.buzz
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
useronelog@gthltd.buzz - Password:
7213575aceACE@#
Targets
-
-
Target
New Catalog and Prices.exe
-
Size
2.0MB
-
MD5
de748901a7cfa64744266b9f0936e4dd
-
SHA1
15d7a614564441c8f1dfcecb6a0e1336f3b870bd
-
SHA256
0aff44dedb5c785c390593623803a17d3d7c435f2400180dde3ba4085af80e1e
-
SHA512
a3137b68d236a77b5ccaff6d69003ac11d6c1cd5cb9c85cca90d7c0848f06c6766c32ae0fa3eacb0d15be7602edda96d06a7c93e77256172bb9e2eb242bddce1
-
SSDEEP
24576:IPbG3Ktu1Dze6HDpLsX6FTqliEBQYKDLWFZ79rWvOBrAQp/8/zZcrGSPa8k0+oi9:IPO3ECalGIUT1ldg0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-