General
-
Target
hesaphareketi-01.exe
-
Size
733KB
-
Sample
230508-tjgv9sbe56
-
MD5
76efcece384fca2dbf2840aaf0521e29
-
SHA1
3d13557865e04d81d3f837a89bacc8455ae0d005
-
SHA256
8838925ac19a77ed2817ed8e52b6b9db02d58987dd10774eac576f839df1c5f5
-
SHA512
86adf6eead8a0e04f3feeae5fdc0240a5681ffe9a6f6a170884ecf370500af5b73c685359b1ebfb939dd4d4c2ae12a8f5a3b1ec0b9a940d1ef3236bb24ccb356
-
SSDEEP
12288:zmdF3JQcpDvnC237A+EcTvu2C6AFDPBwncjf60Ye1urt:KX3JvnC237AjcTWMkLBXf60Y+
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.redseatransportuae.com - Port:
587 - Username:
[email protected] - Password:
method10@10 - Email To:
[email protected]
Targets
-
-
Target
hesaphareketi-01.exe
-
Size
733KB
-
MD5
76efcece384fca2dbf2840aaf0521e29
-
SHA1
3d13557865e04d81d3f837a89bacc8455ae0d005
-
SHA256
8838925ac19a77ed2817ed8e52b6b9db02d58987dd10774eac576f839df1c5f5
-
SHA512
86adf6eead8a0e04f3feeae5fdc0240a5681ffe9a6f6a170884ecf370500af5b73c685359b1ebfb939dd4d4c2ae12a8f5a3b1ec0b9a940d1ef3236bb24ccb356
-
SSDEEP
12288:zmdF3JQcpDvnC237A+EcTvu2C6AFDPBwncjf60Ye1urt:KX3JvnC237AjcTWMkLBXf60Y+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-