General
-
Target
CWXMF230300599.exe
-
Size
689KB
-
Sample
231024-gd1pzaah7w
-
MD5
eae8d9e270bc65f3cfcc90b97083d4b9
-
SHA1
c0eed19977aa5f6100804d2e431d6bb5bef69daa
-
SHA256
67cc89f84a6e88f1b74bce29e680fb2e64d1a0104330ea9dd1cf5770d63cf436
-
SHA512
c22768233177eebf87a2991067fe76816d39416c8d9cc764e6424e90ebf00a832c35455981e2884a61aa748afd50a18d0d1881eb06f47bc473f4ede44fc429e8
-
SSDEEP
12288:sHTBGjiqmtBWT6HTEiGmmzSNdP6BeuboLRMQeIgXZQR:uOiqmtB6GEiLm6658LiQhaZ6
Static task
static1
Behavioral task
behavioral1
Sample
CWXMF230300599.exe
Resource
win7-20231023-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.komturmetal.com - Port:
587 - Username:
[email protected] - Password:
mt.Yildiz1
Extracted
agenttesla
Protocol: smtp- Host:
mail.komturmetal.com - Port:
587 - Username:
[email protected] - Password:
mt.Yildiz1 - Email To:
[email protected]
Targets
-
-
Target
CWXMF230300599.exe
-
Size
689KB
-
MD5
eae8d9e270bc65f3cfcc90b97083d4b9
-
SHA1
c0eed19977aa5f6100804d2e431d6bb5bef69daa
-
SHA256
67cc89f84a6e88f1b74bce29e680fb2e64d1a0104330ea9dd1cf5770d63cf436
-
SHA512
c22768233177eebf87a2991067fe76816d39416c8d9cc764e6424e90ebf00a832c35455981e2884a61aa748afd50a18d0d1881eb06f47bc473f4ede44fc429e8
-
SSDEEP
12288:sHTBGjiqmtBWT6HTEiGmmzSNdP6BeuboLRMQeIgXZQR:uOiqmtB6GEiLm6658LiQhaZ6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-