General
-
Target
daa21539f31ce9d8fcd08046a7b51bce217b4e0b0f980018887eb29faa2c7818
-
Size
671KB
-
Sample
240201-b8cnqsggc3
-
MD5
302a59fd06549d7642c25e6a244010d0
-
SHA1
2d4e18d5d7e6196ae9b080584feec1294df31844
-
SHA256
daa21539f31ce9d8fcd08046a7b51bce217b4e0b0f980018887eb29faa2c7818
-
SHA512
25826ebd2148f7908a9942bebf0fd1d32c5ffbd8089b45991bd906ddf50e0874c6466131d2792e2484237bc9760c553d0f6c32b9c65b7a67aad924747794cf11
-
SSDEEP
12288:zlhlfu8liC5utTr8j8qshDF7+XexC7bB5Khc4rYL55AkT3lpMB7ZZY37OOTuRbB2:yTr8bshR7mexC7bN4Y5rzl+B7UZTD6SN
Static task
static1
Behavioral task
behavioral1
Sample
daa21539f31ce9d8fcd08046a7b51bce217b4e0b0f980018887eb29faa2c7818.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
daa21539f31ce9d8fcd08046a7b51bce217b4e0b0f980018887eb29faa2c7818.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.commtechtrading.com - Port:
587 - Username:
[email protected] - Password:
a#T$4F.tY~Vz - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.commtechtrading.com - Port:
587 - Username:
[email protected] - Password:
a#T$4F.tY~Vz
Targets
-
-
Target
daa21539f31ce9d8fcd08046a7b51bce217b4e0b0f980018887eb29faa2c7818
-
Size
671KB
-
MD5
302a59fd06549d7642c25e6a244010d0
-
SHA1
2d4e18d5d7e6196ae9b080584feec1294df31844
-
SHA256
daa21539f31ce9d8fcd08046a7b51bce217b4e0b0f980018887eb29faa2c7818
-
SHA512
25826ebd2148f7908a9942bebf0fd1d32c5ffbd8089b45991bd906ddf50e0874c6466131d2792e2484237bc9760c553d0f6c32b9c65b7a67aad924747794cf11
-
SSDEEP
12288:zlhlfu8liC5utTr8j8qshDF7+XexC7bB5Khc4rYL55AkT3lpMB7ZZY37OOTuRbB2:yTr8bshR7mexC7bN4Y5rzl+B7UZTD6SN
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-