General
-
Target
cabb6fdf10c577b6d529be65a4e5154dd53e67570d305da21ad39c03f67ce3bb
-
Size
827KB
-
Sample
231205-vmp7gsdd49
-
MD5
23284d731a5f245ed50c262c6bd783c8
-
SHA1
ec77a6f42091861b7544d611d9b01d5c761c44c8
-
SHA256
cabb6fdf10c577b6d529be65a4e5154dd53e67570d305da21ad39c03f67ce3bb
-
SHA512
e62c33552d5f8e866c8b58a1cc5220c06c653b0dd32f8329b62716e81d2958edd734f4e85903e124db0589ed1bca6d9e695d5337ba80f7162ba14dec53eeec62
-
SSDEEP
12288:YWctW8G34/uK45+po2K6YoTmnCS+TZQnOlEs12xIZkrUHCqDRKRoUaggA+X+neXL:534/up+pJHY9L+lQtsY21KCFfXNXL
Static task
static1
Behavioral task
behavioral1
Sample
cabb6fdf10c577b6d529be65a4e5154dd53e67570d305da21ad39c03f67ce3bb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cabb6fdf10c577b6d529be65a4e5154dd53e67570d305da21ad39c03f67ce3bb.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.vector-kl.com - Port:
587 - Username:
[email protected] - Password:
IzzaVectorKL202) - Email To:
[email protected]
Targets
-
-
Target
cabb6fdf10c577b6d529be65a4e5154dd53e67570d305da21ad39c03f67ce3bb
-
Size
827KB
-
MD5
23284d731a5f245ed50c262c6bd783c8
-
SHA1
ec77a6f42091861b7544d611d9b01d5c761c44c8
-
SHA256
cabb6fdf10c577b6d529be65a4e5154dd53e67570d305da21ad39c03f67ce3bb
-
SHA512
e62c33552d5f8e866c8b58a1cc5220c06c653b0dd32f8329b62716e81d2958edd734f4e85903e124db0589ed1bca6d9e695d5337ba80f7162ba14dec53eeec62
-
SSDEEP
12288:YWctW8G34/uK45+po2K6YoTmnCS+TZQnOlEs12xIZkrUHCqDRKRoUaggA+X+neXL:534/up+pJHY9L+lQtsY21KCFfXNXL
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-