General
-
Target
DAILY FUNCTION 2023.exe
-
Size
571KB
-
Sample
230712-ktnbcscf25
-
MD5
be6e83054fb1627d975d65a7ca31a289
-
SHA1
d1005323cb517ebdd03bb91a150c007108d545a1
-
SHA256
78c8035d208cf7487b3fd883bfbeb8ad827dc1cc94056a384433a4b7aef7625e
-
SHA512
b54541beb8ac3a2dfc123422fedae12aef3a43764ab17985c932d26fc367fdb2a7c6c18bc5d80966a5f32017ec589b86d36f478b2d2d346e687434a259bf7578
-
SSDEEP
6144:GVuetcsfOqeazCR9aYeNA3YOlW3kkTDo6ov+WvU7G/NOE3eP1M3UYrGts2/kBt1w:WPHAIO00RpGWvoZPgGT+YFQ4n3xl
Static task
static1
Behavioral task
behavioral1
Sample
DAILY FUNCTION 2023.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
DAILY FUNCTION 2023.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.modelinfra.com - Port:
587 - Username:
[email protected] - Password:
Infr@afu916 - Email To:
[email protected]
Targets
-
-
Target
DAILY FUNCTION 2023.exe
-
Size
571KB
-
MD5
be6e83054fb1627d975d65a7ca31a289
-
SHA1
d1005323cb517ebdd03bb91a150c007108d545a1
-
SHA256
78c8035d208cf7487b3fd883bfbeb8ad827dc1cc94056a384433a4b7aef7625e
-
SHA512
b54541beb8ac3a2dfc123422fedae12aef3a43764ab17985c932d26fc367fdb2a7c6c18bc5d80966a5f32017ec589b86d36f478b2d2d346e687434a259bf7578
-
SSDEEP
6144:GVuetcsfOqeazCR9aYeNA3YOlW3kkTDo6ov+WvU7G/NOE3eP1M3UYrGts2/kBt1w:WPHAIO00RpGWvoZPgGT+YFQ4n3xl
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-