General
-
Target
e-dekont_html.exe
-
Size
594KB
-
Sample
231024-f8xq5aag9y
-
MD5
d09175441808082ab8a05d0af0128450
-
SHA1
a1ea7ac8c9d4ae1da6fd5df14d4e6cf3fc6bfae0
-
SHA256
8f49069af492e2a87edd3a35aafec61b4640c7759917252d317eced01bfbe25f
-
SHA512
8d4b7dde44292d12a208d59f08c7e0aa0845708be046490c04264e00f2732ea145a122fe3ffc198e3521dfe7ca632c7258ca465cf84466b1e449604de39d38a5
-
SSDEEP
12288:ThNh6sxTA6qNhVLUS2pktzLtuov29L98kseXOSfTpaxtFJUDoh:TDDxs6g2pozBRv2skPHfTpaxtFJUDo
Static task
static1
Behavioral task
behavioral1
Sample
e-dekont_html.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
e-dekont_html.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
e-dekont_html.exe
-
Size
594KB
-
MD5
d09175441808082ab8a05d0af0128450
-
SHA1
a1ea7ac8c9d4ae1da6fd5df14d4e6cf3fc6bfae0
-
SHA256
8f49069af492e2a87edd3a35aafec61b4640c7759917252d317eced01bfbe25f
-
SHA512
8d4b7dde44292d12a208d59f08c7e0aa0845708be046490c04264e00f2732ea145a122fe3ffc198e3521dfe7ca632c7258ca465cf84466b1e449604de39d38a5
-
SSDEEP
12288:ThNh6sxTA6qNhVLUS2pktzLtuov29L98kseXOSfTpaxtFJUDoh:TDDxs6g2pozBRv2skPHfTpaxtFJUDo
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-