General
-
Target
5dbddc716f4143d4197f3035bfcb71a00613b91dfc7208ba86f6ac54504d12ca
-
Size
632KB
-
Sample
240328-bfbkzacd2y
-
MD5
e2d974c1421cfe9f4d523da716ad6d0a
-
SHA1
8b13337583f774a53ff16b067cd439e358012ef2
-
SHA256
5dbddc716f4143d4197f3035bfcb71a00613b91dfc7208ba86f6ac54504d12ca
-
SHA512
9c951e4d812b52d7e63c907607859d0f063f8063a734a294f21b75422e8e6d47582bb3c4dc896baf7809f080c0c94dec6ebb14a6ac52961d9ff6a33ee5ea946d
-
SSDEEP
12288:/ItiCZ3nwyyalO/FUp7rDEubczfnlUv4lhxV/KtBsgILkfeSJ/5mmgVq:wtvJRlO/+p7rDEubcDnlUv6JitmgIAfB
Static task
static1
Behavioral task
behavioral1
Sample
L47fz5X2RSrsQIn.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
L47fz5X2RSrsQIn.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.magnatextile.com - Port:
587 - Username:
accessories@magnatextile.com - Password:
ac%{*}mti{*}$es - Email To:
vriat.pine@gmail.com
Extracted
Protocol: smtp- Host:
mail.magnatextile.com - Port:
587 - Username:
accessories@magnatextile.com - Password:
ac%{*}mti{*}$es
Targets
-
-
Target
L47fz5X2RSrsQIn.exe
-
Size
658KB
-
MD5
5313954569433d6b29f6b81862080ae8
-
SHA1
c113656034eed6c5c6ceaf247a20e002bee317f6
-
SHA256
fad66fe6b9c99e9b74fc56c06512b5d90a1296d15afba3cc356389524deb56f4
-
SHA512
db00b6329e45c709ac0bd13aecaec04c8d2593ab20f7fa67196aa67fb709055540e42bb1938fa36c143a2d56fd90ea0ebce953b8d1dbe1f0aa7114c24d0a2206
-
SSDEEP
12288:byzH2iNlw0m3JX7uJAaMOdUpzrrEwbczfnlU747hx7sG683NLoVS3cit:g1Xu34JjMpzrrEwbcDnlU7SnsaaO
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-