General
-
Target
Q-44315.exe
-
Size
615KB
-
Sample
230525-khlndsha24
-
MD5
33c9e0b98954f80ed694998114578c3c
-
SHA1
431a8acc88b4766910904ded92da0451b19b1f58
-
SHA256
a7844d54db8f79a6c878de38086ea87e7bd11ecc16f0550f2258b6cd134392e6
-
SHA512
672e0e83d2c5a47355711be033725b9f7683f9d7d077295ca4520fd1003ba2a8a76084f8be73a7b68e6b9ab28bd17c6eea5857767e804ed638c6a274a4c8705f
-
SSDEEP
12288:X+ngsnqoSdNES81XF8ukAVLAS50fFFsCvsuXpugDqD4GIOH6Cdzss:OqdNES8tnVwFsCX8kjYv
Static task
static1
Behavioral task
behavioral1
Sample
Q-44315.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Q-44315.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.strictfacilityservices.com - Port:
587 - Username:
[email protected] - Password:
SFS!@#321 - Email To:
[email protected]
Targets
-
-
Target
Q-44315.exe
-
Size
615KB
-
MD5
33c9e0b98954f80ed694998114578c3c
-
SHA1
431a8acc88b4766910904ded92da0451b19b1f58
-
SHA256
a7844d54db8f79a6c878de38086ea87e7bd11ecc16f0550f2258b6cd134392e6
-
SHA512
672e0e83d2c5a47355711be033725b9f7683f9d7d077295ca4520fd1003ba2a8a76084f8be73a7b68e6b9ab28bd17c6eea5857767e804ed638c6a274a4c8705f
-
SSDEEP
12288:X+ngsnqoSdNES81XF8ukAVLAS50fFFsCvsuXpugDqD4GIOH6Cdzss:OqdNES8tnVwFsCX8kjYv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-