General
-
Target
ff36d7812f48615d477485cb66103972fb43ea3ecf70999811516d86df7107dd
-
Size
627KB
-
Sample
231205-whpwlade4w
-
MD5
34cdc050458ae8d48e010ee354c21cc5
-
SHA1
1b4fe70c447529d3815b71eede45510066d069c6
-
SHA256
ff36d7812f48615d477485cb66103972fb43ea3ecf70999811516d86df7107dd
-
SHA512
3c6cdf0b2576df335611bbb61d6a104f1af2427eaf34742a215a24954adf7777bc478de60531e04ed0033ccead5dc0d05bd6146a9f2007192be532e7a2c04515
-
SSDEEP
12288:g45+po2Yyk57sz2mygmAETW+GNxd1PeD0LFT0BBcOb4WGaGYa:D+pJLk5sqbgmAEihNx/eDUFABBZ4ara
Static task
static1
Behavioral task
behavioral1
Sample
ff36d7812f48615d477485cb66103972fb43ea3ecf70999811516d86df7107dd.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
ff36d7812f48615d477485cb66103972fb43ea3ecf70999811516d86df7107dd.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bresciagrameen.lk - Port:
587 - Username:
[email protected] - Password:
#S413vT0u45# - Email To:
[email protected]
Targets
-
-
Target
ff36d7812f48615d477485cb66103972fb43ea3ecf70999811516d86df7107dd
-
Size
627KB
-
MD5
34cdc050458ae8d48e010ee354c21cc5
-
SHA1
1b4fe70c447529d3815b71eede45510066d069c6
-
SHA256
ff36d7812f48615d477485cb66103972fb43ea3ecf70999811516d86df7107dd
-
SHA512
3c6cdf0b2576df335611bbb61d6a104f1af2427eaf34742a215a24954adf7777bc478de60531e04ed0033ccead5dc0d05bd6146a9f2007192be532e7a2c04515
-
SSDEEP
12288:g45+po2Yyk57sz2mygmAETW+GNxd1PeD0LFT0BBcOb4WGaGYa:D+pJLk5sqbgmAEihNx/eDUFABBZ4ara
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-