General
-
Target
3a9d4daa5b6a3d3df7252adefb661cb058b2d09bdfb70cf19d5f373ed01434c7exe.exe
-
Size
639KB
-
Sample
231207-yc3xdagc5t
-
MD5
555fa4881f3f6dee809d9eb2dc043163
-
SHA1
b702e6beb3740a25a381b22ab5af9b9f7c9bd499
-
SHA256
3a9d4daa5b6a3d3df7252adefb661cb058b2d09bdfb70cf19d5f373ed01434c7
-
SHA512
bb465ba8f331452a58b826cce9cc7a269b85d2414edc8c3c4077c55ed21631175fbb8dddbd52d7c7416d82b9e814080beaae0d58833f927b77213d4cda11c65e
-
SSDEEP
12288:DhwQaueH5qp5ysTpneaj1sD4vjI9Hapb7MT/9IlrbZvmVq:DhUq/ysFlXw6pv8Il52
Static task
static1
Behavioral task
behavioral1
Sample
3a9d4daa5b6a3d3df7252adefb661cb058b2d09bdfb70cf19d5f373ed01434c7exe.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
3a9d4daa5b6a3d3df7252adefb661cb058b2d09bdfb70cf19d5f373ed01434c7exe.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gimpex-imerys.com - Port:
587 - Username:
[email protected] - Password:
h45ZVRb6(IMF - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.gimpex-imerys.com - Port:
587 - Username:
[email protected] - Password:
h45ZVRb6(IMF
Targets
-
-
Target
3a9d4daa5b6a3d3df7252adefb661cb058b2d09bdfb70cf19d5f373ed01434c7exe.exe
-
Size
639KB
-
MD5
555fa4881f3f6dee809d9eb2dc043163
-
SHA1
b702e6beb3740a25a381b22ab5af9b9f7c9bd499
-
SHA256
3a9d4daa5b6a3d3df7252adefb661cb058b2d09bdfb70cf19d5f373ed01434c7
-
SHA512
bb465ba8f331452a58b826cce9cc7a269b85d2414edc8c3c4077c55ed21631175fbb8dddbd52d7c7416d82b9e814080beaae0d58833f927b77213d4cda11c65e
-
SSDEEP
12288:DhwQaueH5qp5ysTpneaj1sD4vjI9Hapb7MT/9IlrbZvmVq:DhUq/ysFlXw6pv8Il52
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-