General
-
Target
NEAS.4a1e905eda13c02979b5a7562cc9af45f96da810fb7fd01fe858dc998a3d78b9.exe
-
Size
711KB
-
Sample
231111-mbk5dsdd2x
-
MD5
2c0a51d87d3bf16105bee87fb94b9e61
-
SHA1
19143f0ba3126321683870dd03367802b4eadaba
-
SHA256
4a1e905eda13c02979b5a7562cc9af45f96da810fb7fd01fe858dc998a3d78b9
-
SHA512
3da83bc9ff7d312dda29065fd1c7222c4f3043ba1bff679aedaa50fc60801161ee1738910032587e44a75ac518dc481f39697a0d50ae5053c1711304996c3867
-
SSDEEP
12288:q8Yk4I8Vj6DmlU9P6vJxzEYXcugdSSTyQ+W12VYw16jeDDSgG:VYBIm4mPIYXcfSS4w2VYw86DDSg
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4a1e905eda13c02979b5a7562cc9af45f96da810fb7fd01fe858dc998a3d78b9.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.4a1e905eda13c02979b5a7562cc9af45f96da810fb7fd01fe858dc998a3d78b9.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.lgtvproducts.buzz - Port:
587 - Username:
[email protected] - Password:
5662205aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
NEAS.4a1e905eda13c02979b5a7562cc9af45f96da810fb7fd01fe858dc998a3d78b9.exe
-
Size
711KB
-
MD5
2c0a51d87d3bf16105bee87fb94b9e61
-
SHA1
19143f0ba3126321683870dd03367802b4eadaba
-
SHA256
4a1e905eda13c02979b5a7562cc9af45f96da810fb7fd01fe858dc998a3d78b9
-
SHA512
3da83bc9ff7d312dda29065fd1c7222c4f3043ba1bff679aedaa50fc60801161ee1738910032587e44a75ac518dc481f39697a0d50ae5053c1711304996c3867
-
SSDEEP
12288:q8Yk4I8Vj6DmlU9P6vJxzEYXcugdSSTyQ+W12VYw16jeDDSgG:VYBIm4mPIYXcfSS4w2VYw86DDSg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-