General
-
Target
07463687693e68947b76ead68ae75f764649c80725f4914cde0eaf0d1c4644d7exe.exe
-
Size
639KB
-
Sample
231207-x4yajaga2s
-
MD5
e00ea5e1e1b9b1f8a63cb79f7c870359
-
SHA1
dce9d736e1e7865b925a6e77977440528fc77579
-
SHA256
07463687693e68947b76ead68ae75f764649c80725f4914cde0eaf0d1c4644d7
-
SHA512
427de637a2676e021654b3932095299e6674802db562532802bdcfc1eb7747121ca6608c61b4e4e3388293ae10f8d43ebc6fc34ccd23cdd1caf457cc912ac609
-
SSDEEP
12288:g97QaueH5qXSFVWKmcLht4aNkWOJGx4gW8POHnUbVvaoL:g9ZqAUeht4OxekAUByo
Static task
static1
Behavioral task
behavioral1
Sample
07463687693e68947b76ead68ae75f764649c80725f4914cde0eaf0d1c4644d7exe.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
07463687693e68947b76ead68ae75f764649c80725f4914cde0eaf0d1c4644d7exe.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.vrlogistic.com - Port:
587 - Username:
[email protected] - Password:
@dmin@123 - Email To:
[email protected]
Targets
-
-
Target
07463687693e68947b76ead68ae75f764649c80725f4914cde0eaf0d1c4644d7exe.exe
-
Size
639KB
-
MD5
e00ea5e1e1b9b1f8a63cb79f7c870359
-
SHA1
dce9d736e1e7865b925a6e77977440528fc77579
-
SHA256
07463687693e68947b76ead68ae75f764649c80725f4914cde0eaf0d1c4644d7
-
SHA512
427de637a2676e021654b3932095299e6674802db562532802bdcfc1eb7747121ca6608c61b4e4e3388293ae10f8d43ebc6fc34ccd23cdd1caf457cc912ac609
-
SSDEEP
12288:g97QaueH5qXSFVWKmcLht4aNkWOJGx4gW8POHnUbVvaoL:g9ZqAUeht4OxekAUByo
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-