General
-
Target
60e4539ca98b01b697d5f3bb560e413045303426b4396e077ee3b16720547ac6
-
Size
624KB
-
Sample
231212-cpjhlseef6
-
MD5
46fb62c4e2805486028b53e1811c6d11
-
SHA1
b5e6e737ba9cc43cdbd3705d89772d0e8d038ed6
-
SHA256
60e4539ca98b01b697d5f3bb560e413045303426b4396e077ee3b16720547ac6
-
SHA512
8e09a0b2fd1800fca8a8337229df152520bdb84ea355e27ce7010ea133fa26e0180d0e0594ec5b838e4cedcb2245387aa509fbfe9ea89bd1beaf1314172c7c10
-
SSDEEP
12288:dg1JDzr0mA+qQ81ogXMdnbUmlOGbqa6a+aJq/ulYZjTUUeA7sfHREjbEeD:dg1JwmRqQc185bZllqa6a+Du+vUfHRIT
Static task
static1
Behavioral task
behavioral1
Sample
PO202033467382TKZ.exe
Resource
win7-20231129-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Anambraeast@123 - Email To:
[email protected]
Targets
-
-
Target
PO202033467382TKZ.exe
-
Size
699KB
-
MD5
ad4390933035114071374ef995b920fd
-
SHA1
eeab6dcbcf6238460fa7332fce8e943877da1ab7
-
SHA256
597de5e7640065085edfa3bc1a3f24cd5f5c3364882285bf97520fd1f7e40bcc
-
SHA512
0d739ede77bef79ede6c2e071eb2be6588fde2e3ba3cbf725dd97ebd66fda725f88f6b32287dba9f8efbe3fc789fb16391be084396d897652c1bb6b3495270c8
-
SSDEEP
12288:+3IU8S6eUdDBlRA+qqMogX46nD28AVapphqs+RkXyhJZVBb4a7sfH810bm5:UItSAdDBlRRqZ1IcD9Ayh7+oyhJaXfH0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-