General
-
Target
fc443da9c980fb8692d8febdf63ec1777e3c16d30084c52c9c16fc4411da54cd
-
Size
708KB
-
Sample
240224-bmmltaed5v
-
MD5
d96631c2c4d020c3d75b72da21e9051e
-
SHA1
95c2021b7cc3ce36d008870fcf9b9a4e6317a560
-
SHA256
fc443da9c980fb8692d8febdf63ec1777e3c16d30084c52c9c16fc4411da54cd
-
SHA512
86ced6534e455047debc67864e7dbe723cd6abbbc87047ad701dd7e9666b71e1ea2e6b325077e27a37c26ac752cae9791afbe9e4507f18308c64ed302f8660a8
-
SSDEEP
12288:BgKqpu+C7T/zchdGnysmYxKG6KflixwwlEnK/xYKZCvtTEtBhzBh3wdkR:BgKqpkXzchdEmYkG5flixwwlBxEFT6fF
Static task
static1
Behavioral task
behavioral1
Sample
fc443da9c980fb8692d8febdf63ec1777e3c16d30084c52c9c16fc4411da54cd.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fc443da9c980fb8692d8febdf63ec1777e3c16d30084c52c9c16fc4411da54cd.exe
Resource
win10v2004-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mayedasselectromech.com - Port:
587 - Username:
[email protected] - Password:
India@2014 - Email To:
[email protected]
Targets
-
-
Target
fc443da9c980fb8692d8febdf63ec1777e3c16d30084c52c9c16fc4411da54cd
-
Size
708KB
-
MD5
d96631c2c4d020c3d75b72da21e9051e
-
SHA1
95c2021b7cc3ce36d008870fcf9b9a4e6317a560
-
SHA256
fc443da9c980fb8692d8febdf63ec1777e3c16d30084c52c9c16fc4411da54cd
-
SHA512
86ced6534e455047debc67864e7dbe723cd6abbbc87047ad701dd7e9666b71e1ea2e6b325077e27a37c26ac752cae9791afbe9e4507f18308c64ed302f8660a8
-
SSDEEP
12288:BgKqpu+C7T/zchdGnysmYxKG6KflixwwlEnK/xYKZCvtTEtBhzBh3wdkR:BgKqpkXzchdEmYkG5flixwwlBxEFT6fF
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-