General
-
Target
4b34bc3727484ca341c95178cc5fca86791d87706d5d5503644377a080c971d9exe.exe
-
Size
778KB
-
Sample
231207-x4bfrsfh8y
-
MD5
f98f8ddef570e6855e92f5bedd679e0a
-
SHA1
8d4c741006e49809485b16d3210299e7839d1350
-
SHA256
4b34bc3727484ca341c95178cc5fca86791d87706d5d5503644377a080c971d9
-
SHA512
5ef7c79c3174df69a2803e95a315194fb1fcd979eca9124203f37cc80d0cb5efd531ad028df8a691239650ee73780d02efbe503fa6ce354d1f0d68d41da17d98
-
SSDEEP
12288:RijW1uYU0WXGcZI2P/GLC0+i+Gxc/qMNldhRT82kNN/MhH37ixkceykcTcro4QES:muK/GLCfGxc/DN9WRghHLIMhdf
Static task
static1
Behavioral task
behavioral1
Sample
4b34bc3727484ca341c95178cc5fca86791d87706d5d5503644377a080c971d9exe.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4b34bc3727484ca341c95178cc5fca86791d87706d5d5503644377a080c971d9exe.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aci-bd.com - Port:
587 - Username:
[email protected] - Password:
edab1234 - Email To:
[email protected]
Targets
-
-
Target
4b34bc3727484ca341c95178cc5fca86791d87706d5d5503644377a080c971d9exe.exe
-
Size
778KB
-
MD5
f98f8ddef570e6855e92f5bedd679e0a
-
SHA1
8d4c741006e49809485b16d3210299e7839d1350
-
SHA256
4b34bc3727484ca341c95178cc5fca86791d87706d5d5503644377a080c971d9
-
SHA512
5ef7c79c3174df69a2803e95a315194fb1fcd979eca9124203f37cc80d0cb5efd531ad028df8a691239650ee73780d02efbe503fa6ce354d1f0d68d41da17d98
-
SSDEEP
12288:RijW1uYU0WXGcZI2P/GLC0+i+Gxc/qMNldhRT82kNN/MhH37ixkceykcTcro4QES:muK/GLCfGxc/DN9WRghHLIMhdf
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-