General
-
Target
aced2c8014dbfe7a8dc34475f1c3ff50.bin
-
Size
626KB
-
Sample
231128-c9dg4aef24
-
MD5
b489a31e897fd71604d69d0c0730114a
-
SHA1
975d9354c120e534c8900c98885f09e4d4d606db
-
SHA256
4b975fe086fc18e15ac84e4fdddf6b46a8773b3f2810eb55a7cacf67543f8b40
-
SHA512
c1124e39231229e598d8a63a75cf8fcd8a983f7c45bce2b45ba348639394791e6e142d47b444e9d97aba77bff45e19cda1055ab43f76d7ae5c6b649bc01e9957
-
SSDEEP
12288:6O4npV1X4rZUok6MKnNJ5zEJqlI9hEYmDz98ACCgAM2bVgwWK2jplhn3:6Og7ovk6MWNLz3lOeYZ93Ap2rh3
Static task
static1
Behavioral task
behavioral1
Sample
722b47ca4f0c2c337f7adf494536d7aa69d5e6bed3e9641b2017ff588be488cb.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
722b47ca4f0c2c337f7adf494536d7aa69d5e6bed3e9641b2017ff588be488cb.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pharmapanel.com.ar - Port:
587 - Username:
[email protected] - Password:
Pharma23Panel90 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.pharmapanel.com.ar - Port:
587 - Username:
[email protected] - Password:
Pharma23Panel90
Targets
-
-
Target
722b47ca4f0c2c337f7adf494536d7aa69d5e6bed3e9641b2017ff588be488cb.exe
-
Size
680KB
-
MD5
aced2c8014dbfe7a8dc34475f1c3ff50
-
SHA1
cd4efe1e6ef15544eff65388bf78485114ce697a
-
SHA256
722b47ca4f0c2c337f7adf494536d7aa69d5e6bed3e9641b2017ff588be488cb
-
SHA512
9b51bf3d7d98402e655ae54c58ed0a5eb79bccd62b67d32ecbfc923b141e7ad40431632f97c2b6346b8f5f2ddf0d70cb590f86e4ec63b5d2261c37ba50f9aaf6
-
SSDEEP
12288:r2E6jD//mXPp7ajrd2xJu9HhVli9AAh8tyQo5+Ph614eHENz:qtD/uXPAjrDHhQMo5WQDEN
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-