General
-
Target
3d13d0e84851ecff819ac29d35c7e0dc570d7a1e7c768f10f19c4fc09997231d
-
Size
746KB
-
Sample
230612-3h3k1seg2v
-
MD5
8aa87c125f30b524ba29298daee882f7
-
SHA1
72e10d34c3c9bf2b1055e6d1a2d9f434f30db9c8
-
SHA256
3d13d0e84851ecff819ac29d35c7e0dc570d7a1e7c768f10f19c4fc09997231d
-
SHA512
70f12ba743212a0824734f9d982e51267078090711ef6bc4adb131ba1486501350c4f66ba2f7300ce7630c778d222f625f900f4a0dcec0658a6d2bb2af2c1de1
-
SSDEEP
12288:qtLyiHrD9N5VCLQnDxAn0MadZtTNOFCngU7i3ZKHhvWU:qtTrDRA0MarOqgqipKHh+U
Static task
static1
Behavioral task
behavioral1
Sample
3d13d0e84851ecff819ac29d35c7e0dc570d7a1e7c768f10f19c4fc09997231d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3d13d0e84851ecff819ac29d35c7e0dc570d7a1e7c768f10f19c4fc09997231d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mylaconsultancy.com - Port:
587 - Username:
[email protected] - Password:
Myl@@cc0unts - Email To:
[email protected]
Targets
-
-
Target
3d13d0e84851ecff819ac29d35c7e0dc570d7a1e7c768f10f19c4fc09997231d
-
Size
746KB
-
MD5
8aa87c125f30b524ba29298daee882f7
-
SHA1
72e10d34c3c9bf2b1055e6d1a2d9f434f30db9c8
-
SHA256
3d13d0e84851ecff819ac29d35c7e0dc570d7a1e7c768f10f19c4fc09997231d
-
SHA512
70f12ba743212a0824734f9d982e51267078090711ef6bc4adb131ba1486501350c4f66ba2f7300ce7630c778d222f625f900f4a0dcec0658a6d2bb2af2c1de1
-
SSDEEP
12288:qtLyiHrD9N5VCLQnDxAn0MadZtTNOFCngU7i3ZKHhvWU:qtTrDRA0MarOqgqipKHh+U
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-