General
-
Target
P.O #CSCL REF 1198.exe
-
Size
618KB
-
Sample
230615-bc75rsec31
-
MD5
488c6ae6e4a3ad9aa99442fe0000cb75
-
SHA1
1232767b8ff9f2cf75d2f332625d644e55088c28
-
SHA256
cecd0cf9c4fc70ac66d79284d5a4b44da73ba58f23de44a2a00d028ce46facc9
-
SHA512
87acc5e136a59d1b413a854a22c3b677a2c0462550b99b1f0ee0706df1667f859dfcbd64587b90cc28f69517a86c782708123a605500f24b7be4e2d47871d9d6
-
SSDEEP
12288:X+n9snBbMUjEtsiD2+/SFPaNc68l35O5K5hAsBzpn77ngUiN4J+Ts:7BAUIOiHSFADBRsLn7MP4J+
Static task
static1
Behavioral task
behavioral1
Sample
P.O #CSCL REF 1198.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
P.O #CSCL REF 1198.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
1 Livee&&Leets_Livee - Email To:
[email protected]
Targets
-
-
Target
P.O #CSCL REF 1198.exe
-
Size
618KB
-
MD5
488c6ae6e4a3ad9aa99442fe0000cb75
-
SHA1
1232767b8ff9f2cf75d2f332625d644e55088c28
-
SHA256
cecd0cf9c4fc70ac66d79284d5a4b44da73ba58f23de44a2a00d028ce46facc9
-
SHA512
87acc5e136a59d1b413a854a22c3b677a2c0462550b99b1f0ee0706df1667f859dfcbd64587b90cc28f69517a86c782708123a605500f24b7be4e2d47871d9d6
-
SSDEEP
12288:X+n9snBbMUjEtsiD2+/SFPaNc68l35O5K5hAsBzpn77ngUiN4J+Ts:7BAUIOiHSFADBRsLn7MP4J+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-