General
-
Target
Urgent request.exe
-
Size
729KB
-
Sample
230609-qthnrscb89
-
MD5
bee864bff5e11ac3fe30b9add4f72d09
-
SHA1
6ec2a9bfac903b94e498400bd27027c650127866
-
SHA256
fc54140655e3660dc45f2582c9fa41f4f957b22f86375e7c3ca723d28004d8f2
-
SHA512
9317e926eba9c949cee551de7deccf13e989abe48c599d4ce415d1b7cbe12089b04ecc67d83be4695cce11abc407a4013c76108f37f87cc1ffd21cdeb4426fa6
-
SSDEEP
12288:DLPWR28Le0cY+Yg9fb99uGOu04+IGkpuPLdH3VNx7pApciCd0r0qfk:Dr+xL9Rk9HfOkYkpujdH3h7pApcZ0F
Static task
static1
Behavioral task
behavioral1
Sample
Urgent request.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Urgent request.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.garagerobert.be - Port:
587 - Username:
[email protected] - Password:
dibi7779 - Email To:
[email protected]
Targets
-
-
Target
Urgent request.exe
-
Size
729KB
-
MD5
bee864bff5e11ac3fe30b9add4f72d09
-
SHA1
6ec2a9bfac903b94e498400bd27027c650127866
-
SHA256
fc54140655e3660dc45f2582c9fa41f4f957b22f86375e7c3ca723d28004d8f2
-
SHA512
9317e926eba9c949cee551de7deccf13e989abe48c599d4ce415d1b7cbe12089b04ecc67d83be4695cce11abc407a4013c76108f37f87cc1ffd21cdeb4426fa6
-
SSDEEP
12288:DLPWR28Le0cY+Yg9fb99uGOu04+IGkpuPLdH3VNx7pApciCd0r0qfk:Dr+xL9Rk9HfOkYkpujdH3h7pApcZ0F
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-