General
-
Target
b4603870f2a94658bd915f7255062c0629fd8b756e96ad465871f9173a7a0379
-
Size
629KB
-
Sample
231212-crq1gaefa5
-
MD5
3de3b2aec3580c30d26038ae32e441d2
-
SHA1
dfc2501866a225f36d61fe0fcbce7ed288a442cb
-
SHA256
b4603870f2a94658bd915f7255062c0629fd8b756e96ad465871f9173a7a0379
-
SHA512
56840bab4753d3c1ed380ee1092b3211fb2aeb723b964dbe2b046cd32b539a3d25b8becf39a117583d62415d6d57f55295a7f74d525aee0f553f535338ae22e1
-
SSDEEP
12288:w3IU8S6eUdUO2sMCqXHwJORW4iWEgH8CRRjZQ1TGvqbbZuGMkRiPPVFeh:OItSAdUOwMOk/WvjZQ1tZuGMEiPPVF
Static task
static1
Behavioral task
behavioral1
Sample
b4603870f2a94658bd915f7255062c0629fd8b756e96ad465871f9173a7a0379.exe
Resource
win7-20231020-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.mailo.com - Port:
587 - Username:
[email protected] - Password:
Bignosa1995 - Email To:
[email protected]
Targets
-
-
Target
b4603870f2a94658bd915f7255062c0629fd8b756e96ad465871f9173a7a0379
-
Size
629KB
-
MD5
3de3b2aec3580c30d26038ae32e441d2
-
SHA1
dfc2501866a225f36d61fe0fcbce7ed288a442cb
-
SHA256
b4603870f2a94658bd915f7255062c0629fd8b756e96ad465871f9173a7a0379
-
SHA512
56840bab4753d3c1ed380ee1092b3211fb2aeb723b964dbe2b046cd32b539a3d25b8becf39a117583d62415d6d57f55295a7f74d525aee0f553f535338ae22e1
-
SSDEEP
12288:w3IU8S6eUdUO2sMCqXHwJORW4iWEgH8CRRjZQ1TGvqbbZuGMkRiPPVFeh:OItSAdUOwMOk/WvjZQ1tZuGMEiPPVF
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-