General
-
Target
af630ff0ac367e2f1f4ac0984783a3b4c0dfa0402bb312e4ef856a076744d64c
-
Size
755KB
-
Sample
231127-k3z2hsfe68
-
MD5
f112fba16d3dd20ae348e4b74353a3b0
-
SHA1
9806602b4f88ff2bfcfbe4e2c3d212fca9fe2659
-
SHA256
af630ff0ac367e2f1f4ac0984783a3b4c0dfa0402bb312e4ef856a076744d64c
-
SHA512
1815cd6af235a6d828c5a40c662ba41257305aa27c1946bb13b3533706c6ffaba542227d37bee319ebe97b4ed1270bb0eb484bff7931dad28c4af73876d2990f
-
SSDEEP
12288:CfqTlCR1swC+kh8j+aOSW4Kpy4Gi6BklViFvgB0e1D3WuW5dZ0IAxM7G8:oIlsswCfh0+aOppy4icVilgrbW1hB
Static task
static1
Behavioral task
behavioral1
Sample
YU SV Payment.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
YU SV Payment.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Methodman991 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Methodman991
Targets
-
-
Target
YU SV Payment.exe
-
Size
841KB
-
MD5
c9586b5ef698248e11c6fc904ccd1e6d
-
SHA1
3b2246ad338738d2d1dba1cbc7a751091149d338
-
SHA256
cde4e54eecb8d93a3bf01b328a33b998ef032becee8b0e375225cbce85c4a548
-
SHA512
114c617845d7061047db47893357e96703d70f576b4cd6d3c9822e94537a6efe8cea56babb22dae0181a0238b7595a49226780113810ad992a4bf1d2da38a2c9
-
SSDEEP
24576:3MPBrU7n0K+4iAVilgobPwXGYfpBhtD/:S1Ug54xQlJc2Y3
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-