General
-
Target
1ac1161060a6e0e5e56ca582e5e5609d629d7570c95ac78a30abc0580ca415e7
-
Size
696KB
-
Sample
231206-dqbptsaf52
-
MD5
b212315bbfa4a9c69eecd4712b47a7f1
-
SHA1
f3690e7f673cb3d479442f20167ee643e82a802b
-
SHA256
1ac1161060a6e0e5e56ca582e5e5609d629d7570c95ac78a30abc0580ca415e7
-
SHA512
6ce59dd85054a5b6713418bee5368a356e4989b9007d585ff8ab148ac413d2c1db7f9012ab558e5466d400f92d970f5eba71f969890e382f665f223a1ef14973
-
SSDEEP
12288:kil5nF8+Vdqrlb8B5XlfO45dh7D2JPXNwMrKcFedsft40080A13AjJIEN:tlbqhb8BXF5dhOXWst4008l+lIA
Static task
static1
Behavioral task
behavioral1
Sample
1ac1161060a6e0e5e56ca582e5e5609d629d7570c95ac78a30abc0580ca415e7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1ac1161060a6e0e5e56ca582e5e5609d629d7570c95ac78a30abc0580ca415e7.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.issltd.org - Port:
587 - Username:
[email protected] - Password:
iss123 - Email To:
[email protected]
Targets
-
-
Target
1ac1161060a6e0e5e56ca582e5e5609d629d7570c95ac78a30abc0580ca415e7
-
Size
696KB
-
MD5
b212315bbfa4a9c69eecd4712b47a7f1
-
SHA1
f3690e7f673cb3d479442f20167ee643e82a802b
-
SHA256
1ac1161060a6e0e5e56ca582e5e5609d629d7570c95ac78a30abc0580ca415e7
-
SHA512
6ce59dd85054a5b6713418bee5368a356e4989b9007d585ff8ab148ac413d2c1db7f9012ab558e5466d400f92d970f5eba71f969890e382f665f223a1ef14973
-
SSDEEP
12288:kil5nF8+Vdqrlb8B5XlfO45dh7D2JPXNwMrKcFedsft40080A13AjJIEN:tlbqhb8BXF5dhOXWst4008l+lIA
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-