General
-
Target
50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854
-
Size
633KB
-
Sample
240319-b3dzlsdh34
-
MD5
039dc550d934b9fcf052edb597c88615
-
SHA1
12b0e0f854d8e8f803c3a422c27210663e7af713
-
SHA256
50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854
-
SHA512
7f6d05b67bcd75c29a982f6bcb3c37877d037c94e9f56e59d8338de74d92355ce9c1e2fe8f7302e89c25d438eab94f717f017ab0bcae27156ac7c7c87ef86fe7
-
SSDEEP
12288:Y7kmn8KAc60WTPVB8W2Jj38iHC5Bk0OdeMe9P1J8pknAR3/cWagRhHkR:YQmnPQDVB8W2J38CCE0Se9P1GgARvcsu
Static task
static1
Behavioral task
behavioral1
Sample
50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.qool-point.co.ke - Port:
587 - Username:
[email protected] - Password:
Hamida2023??
Extracted
agenttesla
Protocol: smtp- Host:
mail.qool-point.co.ke - Port:
587 - Username:
[email protected] - Password:
Hamida2023?? - Email To:
[email protected]
Targets
-
-
Target
50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854
-
Size
633KB
-
MD5
039dc550d934b9fcf052edb597c88615
-
SHA1
12b0e0f854d8e8f803c3a422c27210663e7af713
-
SHA256
50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854
-
SHA512
7f6d05b67bcd75c29a982f6bcb3c37877d037c94e9f56e59d8338de74d92355ce9c1e2fe8f7302e89c25d438eab94f717f017ab0bcae27156ac7c7c87ef86fe7
-
SSDEEP
12288:Y7kmn8KAc60WTPVB8W2Jj38iHC5Bk0OdeMe9P1J8pknAR3/cWagRhHkR:YQmnPQDVB8W2J38CCE0Se9P1GgARvcsu
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1