General
-
Target
3239f36044eff21de6675f1efe4df404dc2a46387637fc434c49f3754d2cf37f
-
Size
577KB
-
Sample
231011-s1nvgaaa75
-
MD5
ddd3f939f69070a6d1413eed3f4f4cc2
-
SHA1
4046ccf27e5f395ce36c8a284e1151ac97ca4b13
-
SHA256
3239f36044eff21de6675f1efe4df404dc2a46387637fc434c49f3754d2cf37f
-
SHA512
f2f08f2a448034e8daf7f51155d082c4861236f47dd156bc9e6a6284b7adecdec9feb28b4ee910b7f2fc4fb887ff9b99b6cd45c5d8616a979cd26a33088b0336
-
SSDEEP
12288:OaPTvDhpTuD1KKG8JSNTe/rh8i7K/q3LF23MRplDUgYKZ:OarvDhpTusLNq/rDr3p1lIq
Static task
static1
Behavioral task
behavioral1
Sample
MT103.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
MT103.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.adityagroup.co - Port:
587 - Username:
[email protected] - Password:
Aditya!@#$%^ - Email To:
[email protected]
Targets
-
-
Target
MT103.exe
-
Size
663KB
-
MD5
720a42feb540dc11b7048246932c0bff
-
SHA1
962e757e1a74e3a5030106832e62ebc459a3557d
-
SHA256
d61e3784b7daf6605b40092e7eefa5844f36dfdc2235d90bf8a2ed164da875ad
-
SHA512
af718f45f16a027e7c2ee39890db541200e67327fc00a2ea9581385c729cbb73dcc033fc1c6de28716ce89d071040b17baed600b5b8615068fce3204a73ccd5f
-
SSDEEP
12288:i0WWObWAZ1Tut1OJI+yByzqyANhML9MpSsVl:14LTTuLBovANSLeUol
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-