General
-
Target
5b792520f19105ff168a9765807bdfbf
-
Size
461KB
-
Sample
240114-rstkbacdh2
-
MD5
5b792520f19105ff168a9765807bdfbf
-
SHA1
0f48bb4488e229bcbe48b136b9c5314f119f76dd
-
SHA256
804bbe01939efa8390005721104163523d0c3e04c2eab8176e07f96674140245
-
SHA512
c111d8f3903140736b1914fb04841ae82429e93adeaedc6ccc4a44285270c0834598c47c931510856934c0c1efb5e978348c995ed43520e90b441de552e36766
-
SSDEEP
6144:Bhk8T/L9NvIV6Bs8V1QEZUNTwSNQrsgRAH1tVaEYE2tTenRXkauqyy6XU9tkGuWq:l/MgTZKttMEYKnRX5yyHRqQ+jh
Static task
static1
Behavioral task
behavioral1
Sample
bank account.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bank account.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
Mail.jingtai.com.vn - Port:
587 - Username:
[email protected] - Password:
truongtuyen2209
Targets
-
-
Target
bank account.exe
-
Size
780KB
-
MD5
a5640ac4a8b294df8ced6dfd0ca544f3
-
SHA1
94fc2bc720e88f5f1bcab268fd441c3f640d63c3
-
SHA256
c57c8d4d2e724683791c90f26d4499886ab0498688740b5433e1c4a36680564e
-
SHA512
c49a3f261ee1832bc41d887bf0b195ea707a4eb4fd15f46bd3ec55329169ae97d1953338e736532219b483b2954f76545544eb1e7fc632ea78c48b31bb012fbd
-
SSDEEP
12288:eTfMnM2iNv4sDFremgK+gxYdUwW+2FMkBZhnmZF4:O6M1usBremd+gxYY+2FMkcZF4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-