General
-
Target
929e32de615a07a4d2635f30c071b1c4b7843a64caedc2f381122d8df25ee473.exe
-
Size
682KB
-
Sample
240213-dw8azsha24
-
MD5
59fcffaf858a44e45df79af6d8da3731
-
SHA1
2efa4f9b5d0bded1992cbf0892fd42829deea3ef
-
SHA256
929e32de615a07a4d2635f30c071b1c4b7843a64caedc2f381122d8df25ee473
-
SHA512
8cd882bf37daa52864f420cb6c524a596ba3f018c861eac76206793a4325300ac29bbda234a97e4e44084d5298810c0c687f2926182181c620b3d54d13d4b5e9
-
SSDEEP
12288:l6EzqHKMbNozEDBH0Eqk88aFlJ65jniQwtdUCKyh4e3ueRNRBCkspl3SF:lRz87b42HjnepeYbMbi
Static task
static1
Behavioral task
behavioral1
Sample
929e32de615a07a4d2635f30c071b1c4b7843a64caedc2f381122d8df25ee473.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
929e32de615a07a4d2635f30c071b1c4b7843a64caedc2f381122d8df25ee473.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bengalshoe.com - Port:
587 - Username:
[email protected] - Password:
kz@m@n123 - Email To:
[email protected]
Targets
-
-
Target
929e32de615a07a4d2635f30c071b1c4b7843a64caedc2f381122d8df25ee473.exe
-
Size
682KB
-
MD5
59fcffaf858a44e45df79af6d8da3731
-
SHA1
2efa4f9b5d0bded1992cbf0892fd42829deea3ef
-
SHA256
929e32de615a07a4d2635f30c071b1c4b7843a64caedc2f381122d8df25ee473
-
SHA512
8cd882bf37daa52864f420cb6c524a596ba3f018c861eac76206793a4325300ac29bbda234a97e4e44084d5298810c0c687f2926182181c620b3d54d13d4b5e9
-
SSDEEP
12288:l6EzqHKMbNozEDBH0Eqk88aFlJ65jniQwtdUCKyh4e3ueRNRBCkspl3SF:lRz87b42HjnepeYbMbi
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-