General
-
Target
Cotización.vbs
-
Size
318KB
-
Sample
230707-k7tqasgb27
-
MD5
af07804be156bc522ae4a2f0dbd04ffe
-
SHA1
d4c1df8310836d4dc62fef06462f024496a5448c
-
SHA256
a0eee785ad7362d359cc120ee9ec1455fac3e713a5f7912eee64c163e2223a48
-
SHA512
a5e7be4b3f5040f737a68a9801a3962962515a4909bed4ba33d546632f15d6f948905ecb13b4c007a300e3d46db2a471db6d3e3c2b86e6f42d7b84a58b7a5455
-
SSDEEP
192:xqK5c6S0jjuQjjarGkEudzptZEygbKjreYSikjjjjZutYzK1pGt6ZZZSpqxagSTU:xqK5QNp3ngqxXSYZ2Ur
Static task
static1
Behavioral task
behavioral1
Sample
Cotización.vbs
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Cotización.vbs
Resource
win10v2004-20230703-en
Malware Config
Extracted
http://cryptersandtools.minhacasa.tv/e/e
Extracted
agenttesla
Protocol: smtp- Host:
mail.seylan-lk.icu - Port:
587 - Username:
[email protected] - Password:
@=~Uk=x~G-ua - Email To:
[email protected]
Targets
-
-
Target
Cotización.vbs
-
Size
318KB
-
MD5
af07804be156bc522ae4a2f0dbd04ffe
-
SHA1
d4c1df8310836d4dc62fef06462f024496a5448c
-
SHA256
a0eee785ad7362d359cc120ee9ec1455fac3e713a5f7912eee64c163e2223a48
-
SHA512
a5e7be4b3f5040f737a68a9801a3962962515a4909bed4ba33d546632f15d6f948905ecb13b4c007a300e3d46db2a471db6d3e3c2b86e6f42d7b84a58b7a5455
-
SSDEEP
192:xqK5c6S0jjuQjjarGkEudzptZEygbKjreYSikjjjjZutYzK1pGt6ZZZSpqxagSTU:xqK5QNp3ngqxXSYZ2Ur
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-