General
-
Target
YU SV Payment.exe
-
Size
841KB
-
Sample
231204-ld769sac5v
-
MD5
c9586b5ef698248e11c6fc904ccd1e6d
-
SHA1
3b2246ad338738d2d1dba1cbc7a751091149d338
-
SHA256
cde4e54eecb8d93a3bf01b328a33b998ef032becee8b0e375225cbce85c4a548
-
SHA512
114c617845d7061047db47893357e96703d70f576b4cd6d3c9822e94537a6efe8cea56babb22dae0181a0238b7595a49226780113810ad992a4bf1d2da38a2c9
-
SSDEEP
24576:3MPBrU7n0K+4iAVilgobPwXGYfpBhtD/:S1Ug54xQlJc2Y3
Static task
static1
Behavioral task
behavioral1
Sample
YU SV Payment.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
YU SV Payment.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Methodman991 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Methodman991
Targets
-
-
Target
YU SV Payment.exe
-
Size
841KB
-
MD5
c9586b5ef698248e11c6fc904ccd1e6d
-
SHA1
3b2246ad338738d2d1dba1cbc7a751091149d338
-
SHA256
cde4e54eecb8d93a3bf01b328a33b998ef032becee8b0e375225cbce85c4a548
-
SHA512
114c617845d7061047db47893357e96703d70f576b4cd6d3c9822e94537a6efe8cea56babb22dae0181a0238b7595a49226780113810ad992a4bf1d2da38a2c9
-
SSDEEP
24576:3MPBrU7n0K+4iAVilgobPwXGYfpBhtD/:S1Ug54xQlJc2Y3
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-