General
-
Target
be906e39d3e1241a47ebedcdf3d9037e
-
Size
962KB
-
Sample
240310-n8ybnacf2t
-
MD5
be906e39d3e1241a47ebedcdf3d9037e
-
SHA1
130b129121d70a912529e34dae9fe5c0d2d8e1b8
-
SHA256
738e1faa6295bbc4e85f7fdec90b9ec22c95dd77662bcfc37e273e8e47119be3
-
SHA512
a8140041b4ce674c46273b40cf7691dbbe3db8783c72b52a017d9c123c4150adf4b9784cbf6696bf6ea5ffce51011c871d2e6022c602c2f6e493b52b3cd79614
-
SSDEEP
12288:XXUe0b97TgzWoL3s0GMhnRS2DSgn24SwyaUVKnpwwV4pKNageIc2ijm3j2xsunn4:XXUeK0zWK3s0VnRS2xaahpx
Static task
static1
Behavioral task
behavioral1
Sample
be906e39d3e1241a47ebedcdf3d9037e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be906e39d3e1241a47ebedcdf3d9037e.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.logoffices.com - Port:
587 - Username:
[email protected] - Password:
M%X71?1SiKj^
Targets
-
-
Target
be906e39d3e1241a47ebedcdf3d9037e
-
Size
962KB
-
MD5
be906e39d3e1241a47ebedcdf3d9037e
-
SHA1
130b129121d70a912529e34dae9fe5c0d2d8e1b8
-
SHA256
738e1faa6295bbc4e85f7fdec90b9ec22c95dd77662bcfc37e273e8e47119be3
-
SHA512
a8140041b4ce674c46273b40cf7691dbbe3db8783c72b52a017d9c123c4150adf4b9784cbf6696bf6ea5ffce51011c871d2e6022c602c2f6e493b52b3cd79614
-
SSDEEP
12288:XXUe0b97TgzWoL3s0GMhnRS2DSgn24SwyaUVKnpwwV4pKNageIc2ijm3j2xsunn4:XXUeK0zWK3s0VnRS2xaahpx
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-