General
-
Target
efd5266154eb9d415b8313cd8ca9a4ac717c7acee8a2ec69593240e175e151ba
-
Size
737KB
-
Sample
231207-dbmhsaaed5
-
MD5
652b552b73522c30eb1b697d09c815c0
-
SHA1
eca57249430029e0ac25c4786a0f7e404ea22b27
-
SHA256
efd5266154eb9d415b8313cd8ca9a4ac717c7acee8a2ec69593240e175e151ba
-
SHA512
21008e2b2ffa4d80887c45869142642a10de1477ec39bd1a595a2848886274e2adf73b750f36313ba235acc830a9ff086f614476e1344bdec4484055692fb44c
-
SSDEEP
12288:bIJDnd6/D0GRF+VN90ffzML3lQtRmINZ4JhLbklHpxy1tE/ktWS:wnd6/gGR2qzxs2oTGktWS
Static task
static1
Behavioral task
behavioral1
Sample
efd5266154eb9d415b8313cd8ca9a4ac717c7acee8a2ec69593240e175e151ba.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
efd5266154eb9d415b8313cd8ca9a4ac717c7acee8a2ec69593240e175e151ba.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.hostinger.com - Port:
587 - Username:
[email protected] - Password:
Johney11!
Extracted
agenttesla
Protocol: smtp- Host:
smtp.hostinger.com - Port:
587 - Username:
[email protected] - Password:
Johney11! - Email To:
[email protected]
Targets
-
-
Target
efd5266154eb9d415b8313cd8ca9a4ac717c7acee8a2ec69593240e175e151ba
-
Size
737KB
-
MD5
652b552b73522c30eb1b697d09c815c0
-
SHA1
eca57249430029e0ac25c4786a0f7e404ea22b27
-
SHA256
efd5266154eb9d415b8313cd8ca9a4ac717c7acee8a2ec69593240e175e151ba
-
SHA512
21008e2b2ffa4d80887c45869142642a10de1477ec39bd1a595a2848886274e2adf73b750f36313ba235acc830a9ff086f614476e1344bdec4484055692fb44c
-
SSDEEP
12288:bIJDnd6/D0GRF+VN90ffzML3lQtRmINZ4JhLbklHpxy1tE/ktWS:wnd6/gGR2qzxs2oTGktWS
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-