General
-
Target
PO_0CT01.vbs
-
Size
159KB
-
Sample
231201-hfgkjsff7x
-
MD5
dcef6132db05f9704623b495b05c1e4a
-
SHA1
ec64670ba9e10bf41fa634be3f8b7c5bec0f719b
-
SHA256
18f41f2a39ff37e43e2a8e01b0447d613257682929e0d5383458935d8279773c
-
SHA512
6c4eef2875783152687021060b390269e7de5756bcdf45f26880a83a8b65e99240483be5cf72caec6210c706060b53f03ebbf49a46685b4b747fa9c1e27b5b5d
-
SSDEEP
1536:vSBSNS2SNSJSNSImSNSzSNSmSNS8SNSySNSaSNS1SP:v0YzYsYeYmYTY5YHYPYQg
Static task
static1
Behavioral task
behavioral1
Sample
PO_0CT01.vbs
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
PO_0CT01.vbs
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dlewarez.info - Port:
587 - Username:
[email protected] - Password:
esubwDViXlQ2@@## - Email To:
[email protected]
Targets
-
-
Target
PO_0CT01.vbs
-
Size
159KB
-
MD5
dcef6132db05f9704623b495b05c1e4a
-
SHA1
ec64670ba9e10bf41fa634be3f8b7c5bec0f719b
-
SHA256
18f41f2a39ff37e43e2a8e01b0447d613257682929e0d5383458935d8279773c
-
SHA512
6c4eef2875783152687021060b390269e7de5756bcdf45f26880a83a8b65e99240483be5cf72caec6210c706060b53f03ebbf49a46685b4b747fa9c1e27b5b5d
-
SSDEEP
1536:vSBSNS2SNSJSNSImSNSzSNSmSNS8SNSySNSaSNS1SP:v0YzYsYeYmYTY5YHYPYQg
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-