General
-
Target
064632b969185ca5518a8799981a105b.bin
-
Size
521KB
-
Sample
230701-bcxn2afb83
-
MD5
7116ef2fa16a62e7143109959b5a55e9
-
SHA1
452fee9671f0e13860584f3a27296d5c93139c4d
-
SHA256
9cfee0c89c422e7d3e1b29f5a591605d5e1ca72dfe35c97c2beaf72875190a2f
-
SHA512
b344a2aa95d2d8fe26afa3cc2c766b160a3af10115e7c884de093bb8475e8fe0f1f1ee258b9756f9052df36531373a7c84dce8279f46034da9e0bbc3d05c9129
-
SSDEEP
12288:NU5MbOMIcYeYoFpcsPv6TJU78KLZlG/QQE+hs:NUKbLSeL/dPvOKLi/hy
Static task
static1
Behavioral task
behavioral1
Sample
RICHIESTA D'OFFERTA A EDILGRAPPA SRL_PDF.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
RICHIESTA D'OFFERTA A EDILGRAPPA SRL_PDF.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
RICHIESTA D'OFFERTA A EDILGRAPPA SRL_PDF.exe
-
Size
672KB
-
MD5
04d4f55b839a1d2f2335220f37de7686
-
SHA1
4f463e70cc5d382e8eb9662ca748447811ad3153
-
SHA256
8fa741885aa3008210667909c5dc93bbd695bfa9f10b808f329e70a87dbbc262
-
SHA512
ac2dc219a0e509a2c2a9dc0f24313bec4d16ab4970bfc724b4f095e0221316c3388aa698c345217510f45e98184f8feed4b48809284b22953c2d4a87e17aa0f8
-
SSDEEP
12288:W9XncUB8m9VZ2oVHoomvEbJhGYVmxI0/l5UX5yaz15/OO:u8GxQvEvVmxI0/Py5yaz1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-