General
-
Target
ef1778840505e7dc43287294afa17833732af7464b23be4ed5e03134ff8a0af3
-
Size
621KB
-
Sample
231122-mfxnzsbg25
-
MD5
fac4fd0a2d2893d1c39ebbe24bae0dc9
-
SHA1
5faec1a5c4cc7176a6c6471c39d8840482244a12
-
SHA256
ef1778840505e7dc43287294afa17833732af7464b23be4ed5e03134ff8a0af3
-
SHA512
986a9b890ac63d7d59f87cd3900eda8134e3bbd838c47739d713719ce5970ec13d92f97b971ec8e5fabbbc689e5b0fb1259b56c960014c72419b66c142f60135
-
SSDEEP
12288:opB/fQFe2rmPUFvnhnE//tiaI/BF8abZr0D0Sbl+QalyJVZBOBOlFk10lsNR:C2KPUFvFg/tpIZF8ab1lOl1alyJVnOB5
Static task
static1
Behavioral task
behavioral1
Sample
POORD20231109001.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
POORD20231109001.exe
Resource
win10v2004-20231025-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mayaklogistic.ru - Port:
587 - Username:
[email protected] - Password:
Tommy8118 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.mayaklogistic.ru - Port:
587 - Username:
[email protected] - Password:
Tommy8118
Targets
-
-
Target
POORD20231109001.exe
-
Size
811KB
-
MD5
8db3ac84bb799e2ebfdcfe5b8dedcd3d
-
SHA1
f97e2ad47783757ff512426c15d4245a71b91b71
-
SHA256
38f37394fb702ef0c171ad83d2e8d6fee51f859298560a0002b0945c8b6a7edd
-
SHA512
3724b4c7c74eef87c613cd65ba8fb6ddb5386cd898ab3d14c69232a4030c7b6469200323cd98a6d311e5e5ffd08dcb83202a4abb2c8b84f86ded391f8123f4ad
-
SSDEEP
12288:Y8ovJo2zmDUFNntnE/VtiiI/BFMabZiL/1bxmG0Z0BNMu1Y+53P7r9r/+ppppppp:3Wo2CDUFN5gVtvIZFMabq/xfrVSS31q
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-