General
-
Target
272cb49163e3d17971531124c4ba0a4bbb839c51efec036d8f139a2ea928bb29
-
Size
669KB
-
Sample
231208-bk9csshg51
-
MD5
5cdb05635a430afa156e2ec8b9cb3ddb
-
SHA1
12b13506016a8102bd8db0e9b8735775526de0fe
-
SHA256
272cb49163e3d17971531124c4ba0a4bbb839c51efec036d8f139a2ea928bb29
-
SHA512
8d2b8d15a09ff5dd3f88509bb31043998896f5cce6231ecaf15d195dc6b2f27e6d3ed532249795983f76d6bd48e294b2ed6de0d2bb75d1baeb01e91cf2489b06
-
SSDEEP
12288:JhkZ5qIq5AXGKTCjJkmEOkZ9E8VZHvbvei65gMUYwZDKli:JK/qhAXpTCdkTOEPLHDveiH9DKli
Static task
static1
Behavioral task
behavioral1
Sample
272cb49163e3d17971531124c4ba0a4bbb839c51efec036d8f139a2ea928bb29.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
272cb49163e3d17971531124c4ba0a4bbb839c51efec036d8f139a2ea928bb29.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.lldikti6.id - Port:
587 - Username:
[email protected] - Password:
Pawiyatan2023!
Extracted
agenttesla
Protocol: smtp- Host:
mail.lldikti6.id - Port:
587 - Username:
[email protected] - Password:
Pawiyatan2023! - Email To:
[email protected]
Targets
-
-
Target
272cb49163e3d17971531124c4ba0a4bbb839c51efec036d8f139a2ea928bb29
-
Size
669KB
-
MD5
5cdb05635a430afa156e2ec8b9cb3ddb
-
SHA1
12b13506016a8102bd8db0e9b8735775526de0fe
-
SHA256
272cb49163e3d17971531124c4ba0a4bbb839c51efec036d8f139a2ea928bb29
-
SHA512
8d2b8d15a09ff5dd3f88509bb31043998896f5cce6231ecaf15d195dc6b2f27e6d3ed532249795983f76d6bd48e294b2ed6de0d2bb75d1baeb01e91cf2489b06
-
SSDEEP
12288:JhkZ5qIq5AXGKTCjJkmEOkZ9E8VZHvbvei65gMUYwZDKli:JK/qhAXpTCdkTOEPLHDveiH9DKli
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-