General
-
Target
0152a23e723b99ef11b5c04cc3d29564.bin.bin
-
Size
576KB
-
Sample
230506-yxmqwsaf33
-
MD5
e96c7da7446ca3ac27d1e9e3abdd7bde
-
SHA1
38fe99a612b97af576b6fc94add66356e601f2c5
-
SHA256
89cd2624ca8fcadb72a3a90edc58201f1de34d70d1ecb828a74bfb637f47cbc7
-
SHA512
80dc035d1ca7d4fca35f39044a55c3cac39a596162fccc94696fc2e863361dd337f9eafd1f3cf9d3782920769363c046dbad8c002329934dbddbfe3f9868ebfc
-
SSDEEP
12288:dHDPfjqzjMvKvQougwdriIszv6csUvhrROQcJDL5O10Nxbey3xdSHfw+w:NDusg1u7NiUBUJoQcJnk0nb/xYHY+w
Static task
static1
Behavioral task
behavioral1
Sample
2d68c1f9c7fd5b7a9bf7dd14d42b3886eb7b261c777e166127917d9f30a15a87.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2d68c1f9c7fd5b7a9bf7dd14d42b3886eb7b261c777e166127917d9f30a15a87.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.wecaresvc.com - Port:
587 - Username:
[email protected] - Password:
u9367gk8qc - Email To:
[email protected]
Targets
-
-
Target
2d68c1f9c7fd5b7a9bf7dd14d42b3886eb7b261c777e166127917d9f30a15a87.exe
-
Size
809KB
-
MD5
0152a23e723b99ef11b5c04cc3d29564
-
SHA1
e39182a98cce635f845e75cfc7d6cdaaeac5a5de
-
SHA256
2d68c1f9c7fd5b7a9bf7dd14d42b3886eb7b261c777e166127917d9f30a15a87
-
SHA512
44328a71204e1b852dfd31e376b1bf138592b6a2523b2dbcdf8f30cbb80f17fccbc1e2e39bc05bc9193f050f67db9a1760596548be67f95f6214f2407de38d96
-
SSDEEP
12288:Y7jc7MRrmjhQ26Paob2QG0hRMr8UcW2u+woNXC2bFmTTL6dbfQVBGTrRw9RW4hD/:6aIXGAv2vNeD7Uq8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-