General
-
Target
4e4c359c0e36f7e5b3dc44af663ceff5.exe
-
Size
670KB
-
Sample
231003-p2bpraag5v
-
MD5
4e4c359c0e36f7e5b3dc44af663ceff5
-
SHA1
365bfd8d57b3d126091d178b36d75b2e5d9ca1d5
-
SHA256
308bba46bfcb12039b06105bef71afccd82acb7df7658a8a4497c1955c67ee5d
-
SHA512
349a4407f9a054b48def071aef89183ac33930f295d1973667b79b114c8fb641960f4c3bcfdc61d7502fbbe3aeed4d1bee7d86a06aa307af2bead24fcad84eb2
-
SSDEEP
12288:eiMiSAx5PWPQmHUefOX0LGPc+oFECnGVUsHXg7c+aT7PMYmx9Nth6FV1:eiM7Ax5uPZ0efXK0TOVPwNgxmx956t
Static task
static1
Behavioral task
behavioral1
Sample
4e4c359c0e36f7e5b3dc44af663ceff5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4e4c359c0e36f7e5b3dc44af663ceff5.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
jCXzqcP1 daniel 3116 - Email To:
[email protected]
Targets
-
-
Target
4e4c359c0e36f7e5b3dc44af663ceff5.exe
-
Size
670KB
-
MD5
4e4c359c0e36f7e5b3dc44af663ceff5
-
SHA1
365bfd8d57b3d126091d178b36d75b2e5d9ca1d5
-
SHA256
308bba46bfcb12039b06105bef71afccd82acb7df7658a8a4497c1955c67ee5d
-
SHA512
349a4407f9a054b48def071aef89183ac33930f295d1973667b79b114c8fb641960f4c3bcfdc61d7502fbbe3aeed4d1bee7d86a06aa307af2bead24fcad84eb2
-
SSDEEP
12288:eiMiSAx5PWPQmHUefOX0LGPc+oFECnGVUsHXg7c+aT7PMYmx9Nth6FV1:eiM7Ax5uPZ0efXK0TOVPwNgxmx956t
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-