General
-
Target
11424f53ceec0464b125aa0be6d87b36.exe
-
Size
720KB
-
Sample
230601-gs6vjadd4v
-
MD5
11424f53ceec0464b125aa0be6d87b36
-
SHA1
7635af3bc5f0ae25669ed57cc77095baf050c525
-
SHA256
44e5d64cb7530cb3bf9c086a5f1cb7aa7c8a0cd61f08a316b08a95e9d629d853
-
SHA512
a98f29f49c91bd6c9811ead7263e25218a0231b6cafacdf45c4470b8ced94a3eb9985dd44b5458a720e92f1e497008620eee3303cd6be97a8bf30944bab39c03
-
SSDEEP
12288:p8axdEP/SJaL5VKEm252x1A3R8jHmE4yDryyAQIDGVuQuojEm0jp:p8/4s5Vnm2buHx3iDGMV4N0j
Static task
static1
Behavioral task
behavioral1
Sample
11424f53ceec0464b125aa0be6d87b36.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
11424f53ceec0464b125aa0be6d87b36.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
jCXzqcP1 daniel 3116 - Email To:
[email protected]
Targets
-
-
Target
11424f53ceec0464b125aa0be6d87b36.exe
-
Size
720KB
-
MD5
11424f53ceec0464b125aa0be6d87b36
-
SHA1
7635af3bc5f0ae25669ed57cc77095baf050c525
-
SHA256
44e5d64cb7530cb3bf9c086a5f1cb7aa7c8a0cd61f08a316b08a95e9d629d853
-
SHA512
a98f29f49c91bd6c9811ead7263e25218a0231b6cafacdf45c4470b8ced94a3eb9985dd44b5458a720e92f1e497008620eee3303cd6be97a8bf30944bab39c03
-
SSDEEP
12288:p8axdEP/SJaL5VKEm252x1A3R8jHmE4yDryyAQIDGVuQuojEm0jp:p8/4s5Vnm2buHx3iDGMV4N0j
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-