General
-
Target
Invoice #765400.rar
-
Size
664KB
-
Sample
231013-rfr6qaad2w
-
MD5
fd56eba296bcac1351c1752f412c971d
-
SHA1
578dec0533b5c2f7450619b9372e0cb6702d238a
-
SHA256
ae4237ed1856e85fbb153facdf9aec4bbec7e4d32bd3f22628129b886fb44acb
-
SHA512
5650b9a38046c7d872e9c6d9f2e5be837844412928cd1627c9d4d053557764a567a1e7e169120338c8b919503d8259a6d401b54761a187e309d69e2500dc556f
-
SSDEEP
12288:AMURXc5wGk0RiycbyCtjuqsdCF4Qg3QI3gBrqSCPwQDAhqY45qqtI1wThMq3wXy+:AMUtciGzcbbtjuzIF4QgQjZqdPwQDAw4
Static task
static1
Behavioral task
behavioral1
Sample
Invoice #765400.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Invoice #765400.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
premium184.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
^HPUm$4%eL~b - Email To:
[email protected]
Targets
-
-
Target
Invoice #765400.exe
-
Size
1.2MB
-
MD5
8c7184463be150691489096717df0e38
-
SHA1
e5247c85b2735cece7b114db445ac7b98739b333
-
SHA256
657cc831fe3eeaafccde4fe707832b998b699b1e7b525bc2d2fbcb5bbe3c7cd7
-
SHA512
da58cb6e056d4c692b72115c3e8fe334816ad507e743f04824177bc8d0e55afdcf06ace2cf7a1190bd7b1f608a2600f7f18f4ee9f17a783205914033503c2fe5
-
SSDEEP
12288:jFSMy5IBGtmQLZ91uk9v7JbGEYQMGhLHnvzxIwvmm2ieWpBxxw:JSMGTbxZQZGhLHvzxImHTz
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-