General
-
Target
Scan_0366926812023.exe
-
Size
694KB
-
Sample
231211-g9k96agga6
-
MD5
964b7d4d87d7b3e0399164197d8d32f1
-
SHA1
48128fb0758e9c9ae80f5c3d3f4a3a51798b3431
-
SHA256
22fe993d3d069bbd257db91dd0bc76cffabc3a67ac535e0cadc7e58649f78f49
-
SHA512
5d151b87eca87a148dd025a0c4e87ba02bd82842b04666bff7b7ce92fbd65fc17f597343adc5ea75439aaf15fbf50e72c586f44efab995b369dd9ae1e0ad07de
-
SSDEEP
12288:w3IU8S6eUd62pBI/NlGlPm5ITCIRMfiEw53QL+W5RlnVS7ga6k5:OItSAd62pZlRXRMfGV0+W5C5
Static task
static1
Behavioral task
behavioral1
Sample
Scan_0366926812023.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
Scan_0366926812023.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.wrklearning.com - Port:
587 - Username:
[email protected] - Password:
worke2300 - Email To:
[email protected]
Targets
-
-
Target
Scan_0366926812023.exe
-
Size
694KB
-
MD5
964b7d4d87d7b3e0399164197d8d32f1
-
SHA1
48128fb0758e9c9ae80f5c3d3f4a3a51798b3431
-
SHA256
22fe993d3d069bbd257db91dd0bc76cffabc3a67ac535e0cadc7e58649f78f49
-
SHA512
5d151b87eca87a148dd025a0c4e87ba02bd82842b04666bff7b7ce92fbd65fc17f597343adc5ea75439aaf15fbf50e72c586f44efab995b369dd9ae1e0ad07de
-
SSDEEP
12288:w3IU8S6eUd62pBI/NlGlPm5ITCIRMfiEw53QL+W5RlnVS7ga6k5:OItSAd62pZlRXRMfGV0+W5C5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-