General
-
Target
PO 0130717.exe
-
Size
588KB
-
Sample
230718-hhgy4agg28
-
MD5
e5e451cad7fdc03b39aa47a9a2b7ed91
-
SHA1
7cc1198c8d355eacd7a8a5c2137dccfe937f9937
-
SHA256
cc2e949db82610bc2e8238736d3a78d42c0977573ca5a5f81cec4b593bd1e62f
-
SHA512
36f5e53fbfff11c1e89c5bc7f58791e228f2dcd53129a3affd4f039df5a781becc88f5a275f79c4bbd44c8f2182b2ad93c2ac54c2bd9c5e4f358bebeb7c226e6
-
SSDEEP
12288:Vfb/WT4UkuZb4X9bx9DvJmqYjeMsrki1kfIQschsruOI:VfzW/ZbE9bxuU9rkfwC6I
Static task
static1
Behavioral task
behavioral1
Sample
PO 0130717.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
PO 0130717.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mylaconsultancy.com - Port:
587 - Username:
[email protected] - Password:
Myl@@cc0unts - Email To:
[email protected]
Targets
-
-
Target
PO 0130717.exe
-
Size
588KB
-
MD5
e5e451cad7fdc03b39aa47a9a2b7ed91
-
SHA1
7cc1198c8d355eacd7a8a5c2137dccfe937f9937
-
SHA256
cc2e949db82610bc2e8238736d3a78d42c0977573ca5a5f81cec4b593bd1e62f
-
SHA512
36f5e53fbfff11c1e89c5bc7f58791e228f2dcd53129a3affd4f039df5a781becc88f5a275f79c4bbd44c8f2182b2ad93c2ac54c2bd9c5e4f358bebeb7c226e6
-
SSDEEP
12288:Vfb/WT4UkuZb4X9bx9DvJmqYjeMsrki1kfIQschsruOI:VfzW/ZbE9bxuU9rkfwC6I
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-