General
-
Target
hesaphareketi-01.exe
-
Size
1017KB
-
Sample
230605-phra4aha8y
-
MD5
81f454084bb8ee498f680d9eaed25850
-
SHA1
dd763d26044a9e6672281131768405ba25643346
-
SHA256
4a1731baffae0aeb7576bbe744f7c4bec60f3a8865fb6f9ed597f50f6c9e4c09
-
SHA512
cd32c30ef31b496f717249de4782fb860761891480863591d86e29e5b407544dfe64ec3d9b4ec0818414c4a89bc4b7b1b7b4dbf315eda1093a9d814417cc5395
-
SSDEEP
12288:GiVlj3F2Kt6YepVYKi5qUFxMwna156ZG5M+McgRfwfzouhYm9jW:hIpm5H3nZwxdg9wbPh996
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.redseatransportuae.com - Port:
587 - Username:
[email protected] - Password:
method10@10 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.redseatransportuae.com - Port:
587 - Username:
[email protected] - Password:
method10@10
Targets
-
-
Target
hesaphareketi-01.exe
-
Size
1017KB
-
MD5
81f454084bb8ee498f680d9eaed25850
-
SHA1
dd763d26044a9e6672281131768405ba25643346
-
SHA256
4a1731baffae0aeb7576bbe744f7c4bec60f3a8865fb6f9ed597f50f6c9e4c09
-
SHA512
cd32c30ef31b496f717249de4782fb860761891480863591d86e29e5b407544dfe64ec3d9b4ec0818414c4a89bc4b7b1b7b4dbf315eda1093a9d814417cc5395
-
SSDEEP
12288:GiVlj3F2Kt6YepVYKi5qUFxMwna156ZG5M+McgRfwfzouhYm9jW:hIpm5H3nZwxdg9wbPh996
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-