General
-
Target
SOA pdf.img
-
Size
1.2MB
-
Sample
231103-q83x9abg8y
-
MD5
3f624d66d034cc0b47e1cc90f620293e
-
SHA1
6dd1e425054ab1471676cee7860288cae2248507
-
SHA256
a36f044f83511535a62d1187b10d5c92bf557cd07bf85f36519330c04712bb66
-
SHA512
3c864ba53a9a4eb5664fdf0caf08698d2763688fb66864f5187d7f88f1633a8f4122f209c3ac043553d2c2e1325b6cc1f6d9e7a3b60960a8fe0ba506fa203a89
-
SSDEEP
12288:tsxTA6q+YIItbIqt8qedaQ5ZmAhXRwIY2NKJGCkui1iDjUqO24XhvMsK6Ed3:yxs66btEM8d42Y+6/kKjGhEsgd3
Static task
static1
Behavioral task
behavioral1
Sample
VF8LYKLS.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
VF8LYKLS.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sitraco.org.ng - Port:
587 - Username:
[email protected] - Password:
chiso100%800mili - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.sitraco.org.ng - Port:
587 - Username:
[email protected] - Password:
chiso100%800mili
Targets
-
-
Target
VF8LYKLS.EXE
-
Size
732KB
-
MD5
7ec536edfb2f45676b6ca798a49d8dd4
-
SHA1
5b57cac279a60ddc904ec639dcacecdf70b504f5
-
SHA256
8efb5396b4a7e5fea2644c844c1ab7e000b8ce9cafdc1c7172d480731f16c8fc
-
SHA512
f68c666087e93f3b8f6246566d2f85502931715da91ee20e9f18250452b52a74009b885b88979a984dfe689ff300a1d7a375b1ce66d404edaa69b4ebe4095549
-
SSDEEP
12288:GsxTA6q+YIItbIqt8qedaQ5ZmAhXRwIY2NKJGCkui1iDjUqO24XhvMsK6Ed3:Jxs66btEM8d42Y+6/kKjGhEsgd3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-