General
-
Target
9c790f3aa4af087605d3ca829e9e633f.exe
-
Size
916KB
-
Sample
231031-h94beahc4x
-
MD5
9c790f3aa4af087605d3ca829e9e633f
-
SHA1
6cf5bba4716741239b0dd1ec49f09cf0a0e28f66
-
SHA256
dc5a6c0264dc1bd2b948b6bf82b6912e8d7a8e691f95a2dcac4f7f6f0a5abb1e
-
SHA512
3f39600121dae26ad29f07cdcf8444816814b83bb70ee7884fa9c478adb4a298d0754ba6ce659869f7ffecd0ab03df75794b3e9fb84c516d263ebaae321fc939
-
SSDEEP
24576:bTbBv5rUNt/HlTycDRyQJjUZfpaOKUSdQYvH:FBetvtZRyQJchKzPvH
Static task
static1
Behavioral task
behavioral1
Sample
9c790f3aa4af087605d3ca829e9e633f.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
9c790f3aa4af087605d3ca829e9e633f.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
Protocol: smtp- Host:
mymobileorder.com - Port:
587 - Username:
[email protected] - Password:
Grace@20233
Extracted
agenttesla
Protocol: smtp- Host:
mymobileorder.com - Port:
587 - Username:
[email protected] - Password:
Grace@20233 - Email To:
[email protected]
Targets
-
-
Target
9c790f3aa4af087605d3ca829e9e633f.exe
-
Size
916KB
-
MD5
9c790f3aa4af087605d3ca829e9e633f
-
SHA1
6cf5bba4716741239b0dd1ec49f09cf0a0e28f66
-
SHA256
dc5a6c0264dc1bd2b948b6bf82b6912e8d7a8e691f95a2dcac4f7f6f0a5abb1e
-
SHA512
3f39600121dae26ad29f07cdcf8444816814b83bb70ee7884fa9c478adb4a298d0754ba6ce659869f7ffecd0ab03df75794b3e9fb84c516d263ebaae321fc939
-
SSDEEP
24576:bTbBv5rUNt/HlTycDRyQJjUZfpaOKUSdQYvH:FBetvtZRyQJchKzPvH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-