General
-
Target
77e2b6a251b3ed0440f515824c1d67fd.bin
-
Size
692KB
-
Sample
231103-clp6zsad8s
-
MD5
23b22e21b857f092d3be95a787992829
-
SHA1
d1ad8dd7c36c22d27070bb93e6d40e6c0f57471c
-
SHA256
d4f6823c1fcacff03c976cf84da2fb482cc12ceb2fd6720517dd6c5e3226d571
-
SHA512
fb868ab0ff5fb1ff27ba0504db9008eb795a53c0651c274c58991ffd6c7af71d514c258a19b5b98298bdec33916399f8a3a90a3d342089a90ff2986028e386df
-
SSDEEP
12288:9LaMgPVkua4t/+3T0r+c7/tQRpEBFE2kFFdq2BXFL+j3/G5IT0celCZ:5VgVBt/+xQtApEBS2kpzBZ+j3/EIT0x8
Static task
static1
Behavioral task
behavioral1
Sample
e486e7139d822916d3608207854109d49cc1dda5f894d314c2ae1c6aa9ed8249.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
e486e7139d822916d3608207854109d49cc1dda5f894d314c2ae1c6aa9ed8249.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.zoomfilms-cz.com - Port:
587 - Username:
[email protected] - Password:
myguys@@@@@12345 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.zoomfilms-cz.com - Port:
587 - Username:
[email protected] - Password:
myguys@@@@@12345
Targets
-
-
Target
e486e7139d822916d3608207854109d49cc1dda5f894d314c2ae1c6aa9ed8249.exe
-
Size
735KB
-
MD5
77e2b6a251b3ed0440f515824c1d67fd
-
SHA1
17c07d5b66b17ef50890b09effafa109b34a5a0a
-
SHA256
e486e7139d822916d3608207854109d49cc1dda5f894d314c2ae1c6aa9ed8249
-
SHA512
db09559a369887fbc1228faac55d81244b962be8a59aa94ac977ca824886423caba9c48250100ba1c172f779590a62075483c9cb1081bce82747e8fd3b4198ec
-
SSDEEP
12288:IjbyGBWKkv4KnIbow0Qa5oAMJ7Ec0rdebYvgwLHqZ0aTHWsYoa:IjOGwJwKnaSoXqr4/sGV
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-