General
-
Target
Quotation.exe
-
Size
662KB
-
Sample
230629-paay5sdg6s
-
MD5
a53cd85a197fb62a0fb0fc18438f5d42
-
SHA1
b3b4d5698d8029e6839ea5b94a00057d98204570
-
SHA256
c906a3041425da5b92aca8c125d3d9295839b5edd1bb17b22fdd80f1f18a1293
-
SHA512
655723083d573ec4a2ab553943f373f0fe231daea799e33950a65c4342324af177b3201b9e805bbc90b4210c3f912836164c19a1a6934f905d24ccc2d6d12425
-
SSDEEP
12288:nVp0K8s6owWFpEYFYPnVB2eXekv6caLhCNPa5B:nVp0K8s6owWFpVUnWzkihC9aL
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Quotation.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mylaconsultancy.com - Port:
587 - Username:
[email protected] - Password:
Myl@@cc0unts - Email To:
[email protected]
Targets
-
-
Target
Quotation.exe
-
Size
662KB
-
MD5
a53cd85a197fb62a0fb0fc18438f5d42
-
SHA1
b3b4d5698d8029e6839ea5b94a00057d98204570
-
SHA256
c906a3041425da5b92aca8c125d3d9295839b5edd1bb17b22fdd80f1f18a1293
-
SHA512
655723083d573ec4a2ab553943f373f0fe231daea799e33950a65c4342324af177b3201b9e805bbc90b4210c3f912836164c19a1a6934f905d24ccc2d6d12425
-
SSDEEP
12288:nVp0K8s6owWFpEYFYPnVB2eXekv6caLhCNPa5B:nVp0K8s6owWFpVUnWzkihC9aL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-