General
-
Target
product may.exe
-
Size
691KB
-
Sample
231023-jcdvxsef91
-
MD5
4235c2b4dac9a55f060f5f66a747c9c0
-
SHA1
3520c48250c375f3f1b50539fc009e99af7bc75a
-
SHA256
b62200d6871b5f2343d407fa822c9fea82b9c28d7414b088e1a56160bf3706b7
-
SHA512
10d686ea71418a9722ca7ef3d6529df050215a6c6a439194fbeed7515b776499007618fff26037f8c79696fc160185996aadb21dab5a920aa811b7370882e921
-
SSDEEP
12288:9b5yzvbYmBHfuK3vMqVfp47FuNfdjOTTFcWwZg4AhWZDFQzrRBIhneSE:nebY0/uhqVB0IyTmg4AHzrRBIgS
Static task
static1
Behavioral task
behavioral1
Sample
product may.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
product may.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
jCXzqcP1 daniel 3116 - Email To:
[email protected]
Targets
-
-
Target
product may.exe
-
Size
691KB
-
MD5
4235c2b4dac9a55f060f5f66a747c9c0
-
SHA1
3520c48250c375f3f1b50539fc009e99af7bc75a
-
SHA256
b62200d6871b5f2343d407fa822c9fea82b9c28d7414b088e1a56160bf3706b7
-
SHA512
10d686ea71418a9722ca7ef3d6529df050215a6c6a439194fbeed7515b776499007618fff26037f8c79696fc160185996aadb21dab5a920aa811b7370882e921
-
SSDEEP
12288:9b5yzvbYmBHfuK3vMqVfp47FuNfdjOTTFcWwZg4AhWZDFQzrRBIhneSE:nebY0/uhqVB0IyTmg4AHzrRBIgS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-