General
-
Target
payment copy.exe
-
Size
599KB
-
Sample
230509-q79peaab2t
-
MD5
32dd46e3cbfc1c9e871e5b483bd26960
-
SHA1
42e83ccbfaa4d77c8a31f76a06cb16917d6bd19a
-
SHA256
fa06c367eea3dc7496e8b8c3baf34ed7775518d1b779d041f41b0a4b92d4a922
-
SHA512
761d7151eda1977b04091fc743bf7d1d41e2fae85388026b7f3493e5e27e68b123fd930d7ebefa60482f19eaadc0b0642126df2230b21ce13c1e7b883c7635d1
-
SSDEEP
12288:wNj5AyHCaQghrWfrvvdJsl3WpWEAoskvWr7c/byAxGjJ0u+:w3wDyqfrXQV6AobWURxM0u+
Static task
static1
Behavioral task
behavioral1
Sample
payment copy.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
payment copy.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.whitemnlabs.com - Port:
587 - Username:
[email protected] - Password:
1233kingofmoney@ - Email To:
[email protected]
Targets
-
-
Target
payment copy.exe
-
Size
599KB
-
MD5
32dd46e3cbfc1c9e871e5b483bd26960
-
SHA1
42e83ccbfaa4d77c8a31f76a06cb16917d6bd19a
-
SHA256
fa06c367eea3dc7496e8b8c3baf34ed7775518d1b779d041f41b0a4b92d4a922
-
SHA512
761d7151eda1977b04091fc743bf7d1d41e2fae85388026b7f3493e5e27e68b123fd930d7ebefa60482f19eaadc0b0642126df2230b21ce13c1e7b883c7635d1
-
SSDEEP
12288:wNj5AyHCaQghrWfrvvdJsl3WpWEAoskvWr7c/byAxGjJ0u+:w3wDyqfrXQV6AobWURxM0u+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-