General
-
Target
5777c8b62a8be41c8b94267b0f09a02d.bin
-
Size
639KB
-
Sample
240316-bq6tvsab35
-
MD5
8482099f84dfc5302ac5722cb291de76
-
SHA1
e29d3a4c63b96561197d3824211a8d1e18991dc8
-
SHA256
a7ecfc62cb38f2052402cfe325e75f54b908a815377d1ba78ff546e1cdb21459
-
SHA512
47eb7bde6191660602a89f2bfc32927f92ddc79ac21aaebffd0f3b6c14d9fc31d26fc93fd85d93f85820dddcf2154fd14b7a62c88b36d7f8406d646de25bafd7
-
SSDEEP
12288:cbjDnW2mbcMBW3BYRCGoIOlWU72qfskAPrDy/afB0ct0X8:uDnVmbcGcYoYPIhV2NfBD+8
Static task
static1
Behavioral task
behavioral1
Sample
PUK ITALIA PO 120610549.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PUK ITALIA PO 120610549.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.alltoursegypt.com - Port:
587 - Username:
[email protected] - Password:
OPldome23#12klein
Extracted
agenttesla
Protocol: smtp- Host:
mail.alltoursegypt.com - Port:
587 - Username:
[email protected] - Password:
OPldome23#12klein - Email To:
[email protected]
Targets
-
-
Target
PUK ITALIA PO 120610549.exe
-
Size
650KB
-
MD5
876bdd759d990110a2bbd617b0f2c549
-
SHA1
dec55c0273518038e0f2cdabe94d0d33e6fb1704
-
SHA256
066beb79d6fc244e4fc3db3cae1af40749798a52f6b5796f14e3612e1498bf73
-
SHA512
b3f8f1d0cc8a743e907877e699fedf08fe0482aed2d7902a93497d773978bf01d0e78a81341dcd5a6ff0019cfdf43f1cd68d7952dc9f853b2dd2eecc471a23b6
-
SSDEEP
12288:gsJTENl3a+1+UxRhsZzc3LKEUfzPdvpkF55CSuGxCkckJ+ZWsfeXjZ:BxENllxzsZzALKxuHuG7JYWsWXjZ
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-