General
-
Target
30.10.2023 - 02.11.2023 Hesap Ekstresi.exe
-
Size
617KB
-
Sample
231103-trcaraee8w
-
MD5
4649725851eadc797260015dc48b4b24
-
SHA1
13fa2badaa2927414c9ab7bb14e31c70c6e4bc82
-
SHA256
7e1956202b29fa1f4b2069bfca66729c92f55a8597f2915713f525d10daee463
-
SHA512
d27cbff7e23d773579b2a1a7c8aa2d7e77bef2768b8e1b953a6bac43a5a35c0a86948eaa2f2c5fe77d107d348d506ff8e35fbd7156499772871396924c9453b2
-
SSDEEP
12288:zIk4ZYX+BYDO0obSi1SLrahlHr6WoyN76h4A6yw:zIkZ+Bl0o/10rclH2WoywcD
Static task
static1
Behavioral task
behavioral1
Sample
30.10.2023 - 02.11.2023 Hesap Ekstresi.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
30.10.2023 - 02.11.2023 Hesap Ekstresi.exe
Resource
win10v2004-20231025-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.zqamcx.com - Port:
587 - Username:
[email protected] - Password:
method5000@ - Email To:
[email protected]
Targets
-
-
Target
30.10.2023 - 02.11.2023 Hesap Ekstresi.exe
-
Size
617KB
-
MD5
4649725851eadc797260015dc48b4b24
-
SHA1
13fa2badaa2927414c9ab7bb14e31c70c6e4bc82
-
SHA256
7e1956202b29fa1f4b2069bfca66729c92f55a8597f2915713f525d10daee463
-
SHA512
d27cbff7e23d773579b2a1a7c8aa2d7e77bef2768b8e1b953a6bac43a5a35c0a86948eaa2f2c5fe77d107d348d506ff8e35fbd7156499772871396924c9453b2
-
SSDEEP
12288:zIk4ZYX+BYDO0obSi1SLrahlHr6WoyN76h4A6yw:zIkZ+Bl0o/10rclH2WoywcD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-