General
-
Target
e1a197d00f88c4440422ce645e363f9a
-
Size
710KB
-
Sample
240327-pa4lfsbf83
-
MD5
e1a197d00f88c4440422ce645e363f9a
-
SHA1
4aa043ce466e3e01186d2d9c652f1812268832f8
-
SHA256
936fa9d5f9708a96f2e8cc270deb24518d047450e0618c6c22753d97a7589177
-
SHA512
662ced293aa9f69af14f9c7cbe3fd48d92d24263d39af57d98794133ad60f4e7352caabea08da9648b970929fb7739674c8aaf5b61468599f58f4f046e31b72d
-
SSDEEP
12288:CWXRVTW5UtiP5QDIBwFDqpFU60MXcaSz8T8JME25lSLgTyf+NDeRbjnWoOp9:zTIUIPSDCT9dMlIYuRfSIJeRHrOL
Static task
static1
Behavioral task
behavioral1
Sample
Scan copy_001.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Scan copy_001.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.shivsundaram.com - Port:
587 - Username:
[email protected] - Password:
hemant@10023
Targets
-
-
Target
Scan copy_001.exe
-
Size
947KB
-
MD5
45d964682ea37a0809803e813638017f
-
SHA1
9d6c3495865736235e55d8384832e9f09cb70896
-
SHA256
b7ee1c6ebcc9675e5e1e3743b03a712c5e789f9b456275c05b35502bea6131e6
-
SHA512
e4b2d060dd4066534cc6c8e726f7e41e637ad6a0203dc36c59d75eb136a366695adcbe363eb8627e4df46f659821d6fea85995c28686dd2453aa14ba4a727356
-
SSDEEP
12288:ZXQZnf1pZRNtMLHK7zMWM9IZoFhK5zM66MXo8QR8T+JqS25lsxW9gf+NLIRljvfm:efXTs9Ktl7Yf2SoPfsMdIR9h
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-