General
-
Target
PI # ARDFZC 0003722023.exe
-
Size
1.1MB
-
Sample
231207-l7cx8ahc43
-
MD5
3e2a479e553002fa5a7632ff48328c9c
-
SHA1
4bfbf7edb54b0f7c64037a48674a6865a7ce844a
-
SHA256
f80099a7582ca527be303b551c9efd3080fd8d729f29cada9113693399737229
-
SHA512
def737da2e9f4650d41a711020c40acccfa5deaba4126a8f51dcebb646116f0df60a5ccf9fe14168faea1bc643522c2e2a6150db26a3806cd81a911f182c1bb5
-
SSDEEP
12288:vFkCRtvzGNWF+T1wn+dMhkZ5lilHBU2XHsS97nzJAgxXrYjdscZ+h/rOsIp5Rn4K:vFRtvzGNWBpK/liNnHscb7YjdsNDbIV
Static task
static1
Behavioral task
behavioral1
Sample
PI # ARDFZC 0003722023.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
PI # ARDFZC 0003722023.exe
Resource
win10v2004-20231201-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.amtechcards.com - Port:
587 - Username:
[email protected] - Password:
]i[a(tUWlmp% - Email To:
[email protected]
Targets
-
-
Target
PI # ARDFZC 0003722023.exe
-
Size
1.1MB
-
MD5
3e2a479e553002fa5a7632ff48328c9c
-
SHA1
4bfbf7edb54b0f7c64037a48674a6865a7ce844a
-
SHA256
f80099a7582ca527be303b551c9efd3080fd8d729f29cada9113693399737229
-
SHA512
def737da2e9f4650d41a711020c40acccfa5deaba4126a8f51dcebb646116f0df60a5ccf9fe14168faea1bc643522c2e2a6150db26a3806cd81a911f182c1bb5
-
SSDEEP
12288:vFkCRtvzGNWF+T1wn+dMhkZ5lilHBU2XHsS97nzJAgxXrYjdscZ+h/rOsIp5Rn4K:vFRtvzGNWBpK/liNnHscb7YjdsNDbIV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-