General
-
Target
67a4fb3d712f983a6cb286f604c6c3a9
-
Size
972KB
-
Sample
240119-pvcy8segd3
-
MD5
67a4fb3d712f983a6cb286f604c6c3a9
-
SHA1
1ac4619a455b339e778756ef733d744a7de90fb8
-
SHA256
3b93cf2d1500295e4269ae32f0f5eb2b79eeb1bd1b05f08340bf691e40bd3d0d
-
SHA512
c68228ae9c68ade041fb431d5ac3512a21389e5a51cb5f412d9dd8550c38d3f33cefc61a34b2d6aac7296817df5ea3c5e2a2ae951bbf2186ed63b6cb04dabd8d
-
SSDEEP
12288:o1rg40DASNK8CZqU/uPDLm7KK49j/GbB9dBX0fV9YYFOkbwXaq2y3/ny4b:o2vAcK8CZpuP++K45ejXmwsO1K+364b
Static task
static1
Behavioral task
behavioral1
Sample
67a4fb3d712f983a6cb286f604c6c3a9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67a4fb3d712f983a6cb286f604c6c3a9.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.badonfashoin.com/ - Port:
21 - Username:
[email protected] - Password:
kKsIA9XNV2zG
Targets
-
-
Target
67a4fb3d712f983a6cb286f604c6c3a9
-
Size
972KB
-
MD5
67a4fb3d712f983a6cb286f604c6c3a9
-
SHA1
1ac4619a455b339e778756ef733d744a7de90fb8
-
SHA256
3b93cf2d1500295e4269ae32f0f5eb2b79eeb1bd1b05f08340bf691e40bd3d0d
-
SHA512
c68228ae9c68ade041fb431d5ac3512a21389e5a51cb5f412d9dd8550c38d3f33cefc61a34b2d6aac7296817df5ea3c5e2a2ae951bbf2186ed63b6cb04dabd8d
-
SSDEEP
12288:o1rg40DASNK8CZqU/uPDLm7KK49j/GbB9dBX0fV9YYFOkbwXaq2y3/ny4b:o2vAcK8CZpuP++K45ejXmwsO1K+364b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-