General
-
Target
bb6455721221afb980661df55c7aa8ae40d04986bb48bb32638c656654955d91
-
Size
696KB
-
Sample
231207-c3s9zaghdq
-
MD5
942159927d5bc0cb1b02e398584cf1a9
-
SHA1
ef7a0a018ce8389b5a5e7c5af7a787a5695e3ebe
-
SHA256
bb6455721221afb980661df55c7aa8ae40d04986bb48bb32638c656654955d91
-
SHA512
fb4ac3c81e7e1485de6fc48909bfb3dbf54d54067ba95ca6d540cd70a550d2e5e23f5b868afd217e906adaa64eff3994576248bacd1859bd7950cdb0919f2842
-
SSDEEP
12288:KueH5qZFQVFuC0aWx+LOoDDygLt3YI0Yn5YP7Z+P8nU2fLwHN+JoNcJjgntXyzrL:uqZFQt0n2OozVfH5X8nU2fkHN+u2i5yr
Static task
static1
Behavioral task
behavioral1
Sample
bb6455721221afb980661df55c7aa8ae40d04986bb48bb32638c656654955d91.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bb6455721221afb980661df55c7aa8ae40d04986bb48bb32638c656654955d91.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server273.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
q@OOZf!+4ERy - Email To:
[email protected]
Targets
-
-
Target
bb6455721221afb980661df55c7aa8ae40d04986bb48bb32638c656654955d91
-
Size
696KB
-
MD5
942159927d5bc0cb1b02e398584cf1a9
-
SHA1
ef7a0a018ce8389b5a5e7c5af7a787a5695e3ebe
-
SHA256
bb6455721221afb980661df55c7aa8ae40d04986bb48bb32638c656654955d91
-
SHA512
fb4ac3c81e7e1485de6fc48909bfb3dbf54d54067ba95ca6d540cd70a550d2e5e23f5b868afd217e906adaa64eff3994576248bacd1859bd7950cdb0919f2842
-
SSDEEP
12288:KueH5qZFQVFuC0aWx+LOoDDygLt3YI0Yn5YP7Z+P8nU2fLwHN+JoNcJjgntXyzrL:uqZFQt0n2OozVfH5X8nU2fkHN+u2i5yr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-