General
-
Target
3a646aad7bdedf631ae7406d819be31b52faa5fe5b1e3d0c26f96a1ad14703a5.zip
-
Size
661KB
-
Sample
240315-ck7dwadh8x
-
MD5
92b1bfdc4bf7a9497d37454f8e75c716
-
SHA1
24ea66a84d327496faacf9212c1c434543aee751
-
SHA256
3a646aad7bdedf631ae7406d819be31b52faa5fe5b1e3d0c26f96a1ad14703a5
-
SHA512
338e81aaf33ace76972189c76f226ce9e9e8d964085d8a7fcdb81dfe3f8119575972d4eabf504d0319fd93de20245419679fad77fb1508b3b26524e038714c1d
-
SSDEEP
12288:8QIQ2EIkhiJWQyCCHIGie1p7wxSpuspIaAaUBlGCvUrdC:bI5kKWQyHHIGx1wxSpuskBACvkC
Static task
static1
Behavioral task
behavioral1
Sample
509656.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
509656.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.awelleh3.top - Port:
587 - Username:
[email protected] - Password:
QcR_(8@AdfHa - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.awelleh3.top - Port:
587 - Username:
[email protected] - Password:
QcR_(8@AdfHa
Targets
-
-
Target
509656.exe
-
Size
724KB
-
MD5
dcaac79baa55279a9d3a68aa8e91e0d9
-
SHA1
afb34c358919410594233644d507a4a8ad1f967d
-
SHA256
ea8e979a9bf6fe2e8af35cedb5d639091629a2ce626f1339c7a0a48e3cc39ba2
-
SHA512
67a4b7a2adca8935cda0e6ee8e05d0652f5549ee436eb93673d886f48354b719977970bed76f65c95b39a614413bc3eae43fb75024d397b2dcb12326826a8c69
-
SSDEEP
12288:HCsLuMhHwgG3UiJuEULGtIWWCsUDSjfvocPnOVySPf9Okzf:Bo1UCtIWbDSjXbnsVPskz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects executables packed with SmartAssembly
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-