General
-
Target
9179d3307d1866cf6cf5298f794b27b6.bin
-
Size
655KB
-
Sample
230612-cjk49aae33
-
MD5
4a48e59b562dac6a4ea2f639562cc4bf
-
SHA1
ec178a781b7f4eb1b60fc0a31bfe040d347e9ed1
-
SHA256
78ca939a675abcc368871c8d4ac8182e124408538df90e924f8dda21f6e9ec0f
-
SHA512
cdaa952d9d5ecaf36dbee79b09f59c32a692684b14d404160a479f69c4887b001a892f499fb00b4d658e4748893425a3547df43895b833d07b81b9e5977b2389
-
SSDEEP
12288:C2F1W2F2NT/cJaEjweLXOCvxv9yWa72e7C5hXjQkQxdD6h/lDLE7wtFxj:C6tUT/GjwVCvFoJyQ9x56JZt
Static task
static1
Behavioral task
behavioral1
Sample
683532549c9b7349442f5dc3466cacc398bb663564eb63f77a2964dd216dce16.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
683532549c9b7349442f5dc3466cacc398bb663564eb63f77a2964dd216dce16.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.valtronics-ae.com - Port:
587 - Username:
[email protected] - Password:
bloodybg@123 - Email To:
[email protected]
Targets
-
-
Target
683532549c9b7349442f5dc3466cacc398bb663564eb63f77a2964dd216dce16.exe
-
Size
757KB
-
MD5
9179d3307d1866cf6cf5298f794b27b6
-
SHA1
ad1009cdc2ba7ea7c825bb3d9f734b8ce3a7af49
-
SHA256
683532549c9b7349442f5dc3466cacc398bb663564eb63f77a2964dd216dce16
-
SHA512
83edec2e8dc0e0db6b0df8078806d2863b12d7f7c5058faa771c70e7aede591390c32eeee15679915d63a400a9eea9df7574905f1a81b94c16decc2397589262
-
SSDEEP
12288:RG4haDnLMzIL2q+RTdOL8mG8pTWQ68IfJzOXGzqVcVcrxaGw2xfYi2Zv5:BOyqGUL8mZTWQ4f9VzqVcml9Cv5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-