General
-
Target
67f40b3ee5517e545ce0cbcdcb1495fb.bin
-
Size
581KB
-
Sample
231011-pt5mvsga6x
-
MD5
1c1212f55f5da812cc08e790d4f55825
-
SHA1
4c0027c1776ad2621952faf9169f8da5da37002c
-
SHA256
28599691509badb517a10f36922f8efc8b4b5a4f4bbc7319a130eede8cef818c
-
SHA512
ceb180367a815f497d607c2e60b06fe19b40573f54314dec1af14708e2b3ce0eda71936341073b9ad80b7dbc8ee269d2f7762c0f51cfeffc9539df82311d0c59
-
SSDEEP
12288:Gljt8Xr8E+FJ6+YxLX2u+oCVd4U48J/WLC2i9/u6eMki:GlSx71m/VO7E/sC2A/u6eMki
Static task
static1
Behavioral task
behavioral1
Sample
Justificante_Pago_Certificado_Corriente_Pago.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Justificante_Pago_Certificado_Corriente_Pago.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.tecnosilos.com.py - Port:
587 - Username:
[email protected] - Password:
;.%^d08lQM@D
Extracted
agenttesla
Protocol: smtp- Host:
mail.tecnosilos.com.py - Port:
587 - Username:
[email protected] - Password:
;.%^d08lQM@D - Email To:
[email protected]
Targets
-
-
Target
Justificante_Pago_Certificado_Corriente_Pago.exe
-
Size
615KB
-
MD5
ace4fe25d9a311eb76341e8852a27471
-
SHA1
5b1218f378fee6fd959f78b11849fb081204bce6
-
SHA256
528aceae347b69455dfb59afd54770e03a3ff27a7c3b38f0cbe79ffb4b317ffa
-
SHA512
8d404f5b9f27bd57f81c6c3f11d1b635c1d6ef9aba0d879e4becfbdf21110330ef45a572dbce5d44def31fff39e03fa3b205e2af7523d7e7f54759ef5e5b8297
-
SSDEEP
12288:HT725l3XhcHyUZvKD+BHhE1bVhW2UZlre/TYWh/gOw:GD3RcpZQ+ByLhWJxsTYOY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-