General
-
Target
30f590b2370054df8174f027d5b9fa08.bin
-
Size
719KB
-
Sample
231112-b2dmfsda49
-
MD5
631ac303fde243be88c1272fceb0790e
-
SHA1
e1b141d66320fc823884868c4b62024d7fb5ad85
-
SHA256
311cf8453d2d3724a5d2095634c7d03870b983dcc1c357e2ebaa4ef3ddc6fc01
-
SHA512
e5282795f4f6625798e74a13b26306cfce650bbb72608e5e526274adaa26d5556c7aeb8b42b87452a37f612328aabc7c0c8c013e6ba351b5490a1c244ef3e824
-
SSDEEP
12288:B0Rkcax0ClaVj6+sVu5aIfNkTEJYxPrAjQfUyHoYDCdFYRDrdaon/zsu+C8DFrc:BvSCIVj6+4ugIyPxPE8fUSoY9rnIuuBI
Static task
static1
Behavioral task
behavioral1
Sample
533f665f835376d5e5d933654b61bf3ccc2a2c0d2e560a9dca28865721060d28.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
533f665f835376d5e5d933654b61bf3ccc2a2c0d2e560a9dca28865721060d28.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Loverboy@123 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Loverboy@123
Targets
-
-
Target
533f665f835376d5e5d933654b61bf3ccc2a2c0d2e560a9dca28865721060d28.exe
-
Size
850KB
-
MD5
30f590b2370054df8174f027d5b9fa08
-
SHA1
326d15da39c146089f75ee0eb0d436e900d5801a
-
SHA256
533f665f835376d5e5d933654b61bf3ccc2a2c0d2e560a9dca28865721060d28
-
SHA512
42d295ca708a25171a3ba94add96e10e22ce73d19cf3e36353c865b1c0c260d4aaa650dbfdeacdc89ae2f52e0896dbcfd8ca2fc66d9ee8a429ab7ca8f504a2db
-
SSDEEP
12288:EaDc4nal7XZkjbFGw92i3qJhBoLGjAU28tJEN9g4wjV+dpsW+199dswtUmb:Eic4IT2jbFTci3+UCUOtJEXgBjM+1zH
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-