General
-
Target
154c5d86522ffd7a1cd03d23b3b19ee5.bin
-
Size
143KB
-
Sample
240327-bkrgzsgf89
-
MD5
70250e6b31ae996ce3ae2055c45738bb
-
SHA1
5b1673ffcf3db54ffdaac918c501d2e23c2bea3f
-
SHA256
2a2f86509bacd2fb5f9e972c1f77295d98ac4a620f1ae415a26b9fbc2da964da
-
SHA512
4dc52f0b1741b6ff5f3420fb70f0f4486285de16d4fc5e7c11456682e72884e095f1cbdadcae2838dc1fc1221b3bf9065e1b85de23b267040489c55e1174905a
-
SSDEEP
3072:8gumT85TGzfo1tIBGfPXju/zYOiE6njoxAf+tFNj8pNbO+AQBMj3VDO:8gfwFGDEIAy/bInvf+Vj8pN0QBYBO
Static task
static1
Behavioral task
behavioral1
Sample
b3f2c0468d40628a6fa17d8dfaca76b89525063c9f1c3b337f9929311e4d7cfe.vbs
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b3f2c0468d40628a6fa17d8dfaca76b89525063c9f1c3b337f9929311e4d7cfe.vbs
Resource
win10v2004-20231215-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.bfm.com.mk - Port:
587 - Username:
[email protected] - Password:
Sonja1234@@4321
Extracted
agenttesla
Protocol: smtp- Host:
mail.bfm.com.mk - Port:
587 - Username:
[email protected] - Password:
Sonja1234@@4321 - Email To:
[email protected]
Targets
-
-
Target
b3f2c0468d40628a6fa17d8dfaca76b89525063c9f1c3b337f9929311e4d7cfe.vbs
-
Size
196KB
-
MD5
154c5d86522ffd7a1cd03d23b3b19ee5
-
SHA1
41743b862c01c4c8eef124a85560657f58a0a575
-
SHA256
b3f2c0468d40628a6fa17d8dfaca76b89525063c9f1c3b337f9929311e4d7cfe
-
SHA512
0179e5323e21f3f34dbbe5ed2930ca25fa8158db15824adae867e9cf74df1a642516aa86910676c06a3f39fe9a7f7296f8f5fa70e7a23b4227535bd0b525a760
-
SSDEEP
3072:k+az7K1R0Qnfs+7d7mz6WK5jiAQeQ/fCdkoLTIXlcoutMAp5Fvk2:SCXkKIeWK5jFw3CGc9tXp5Fvk2
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-