General
-
Target
b7c76bb110b35e6e68b673ecfd89bc402869141c9b12fd7d37087958eea97950.exe
-
Size
727KB
-
Sample
230403-qthzjagf7y
-
MD5
fb38700722d5ce220466a7456cfdacc7
-
SHA1
476cff62f11dcefa1ed1383b69c488ee602ebe6c
-
SHA256
b7c76bb110b35e6e68b673ecfd89bc402869141c9b12fd7d37087958eea97950
-
SHA512
e1a7752112486e4c01b541edae1f42134b666048df5798583bc1e992126b8db03b0e5f988359dc07379b4a95c0fce2173826354c62881f87a998fcdf2ccb48b3
-
SSDEEP
12288:pvWmYMUnFW/NMbNkuRIkYR5TITnKk4lnEJo82/yh2al637IH2QCPXB4oEQEm+fT:pvWUGBL65UTnBenuoKhmrG2dPXB40E3L
Static task
static1
Behavioral task
behavioral1
Sample
b7c76bb110b35e6e68b673ecfd89bc402869141c9b12fd7d37087958eea97950.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b7c76bb110b35e6e68b673ecfd89bc402869141c9b12fd7d37087958eea97950.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
kP#mQcg088 - Email To:
[email protected]
Targets
-
-
Target
b7c76bb110b35e6e68b673ecfd89bc402869141c9b12fd7d37087958eea97950.exe
-
Size
727KB
-
MD5
fb38700722d5ce220466a7456cfdacc7
-
SHA1
476cff62f11dcefa1ed1383b69c488ee602ebe6c
-
SHA256
b7c76bb110b35e6e68b673ecfd89bc402869141c9b12fd7d37087958eea97950
-
SHA512
e1a7752112486e4c01b541edae1f42134b666048df5798583bc1e992126b8db03b0e5f988359dc07379b4a95c0fce2173826354c62881f87a998fcdf2ccb48b3
-
SSDEEP
12288:pvWmYMUnFW/NMbNkuRIkYR5TITnKk4lnEJo82/yh2al637IH2QCPXB4oEQEm+fT:pvWUGBL65UTnBenuoKhmrG2dPXB40E3L
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-