General
-
Target
855161d6a02d4e406fd492bf569809c7be4edafb80888cf9147bf1a1f803ad69
-
Size
663KB
-
Sample
240328-bqy41sce61
-
MD5
d5e2b9feb1242e7c913bb0f8b0d4cadf
-
SHA1
ef96dbe5a6ed0e69f2daf7a059a099a69262e1e8
-
SHA256
855161d6a02d4e406fd492bf569809c7be4edafb80888cf9147bf1a1f803ad69
-
SHA512
5b1bdeef4aaf50d44a41010bd4ab313b3f593701e4a5c79fb8969c33ac60fb9f9e26a6d8094b111673c5c69507e5f57c0262db13ff997d0388a2f468cb715171
-
SSDEEP
12288:yrzZzS4LjTdrxV9fbhMKCWedtyp6Aot1PnwV9FrGKK6KXEtJqb9NKRtSS:wZz7LjTdxV9fbmKbed8p6Aot1PwV9FCa
Static task
static1
Behavioral task
behavioral1
Sample
APRIL ORDER #344673.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
APRIL ORDER #344673.exe
Resource
win10v2004-20240319-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.shivomrealty.com - Port:
587 - Username:
[email protected] - Password:
Priya1982# - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.shivomrealty.com - Port:
587 - Username:
[email protected] - Password:
Priya1982#
Targets
-
-
Target
APRIL ORDER #344673.exe
-
Size
725KB
-
MD5
cd3754976ede221faea878084c12f20a
-
SHA1
5034bade13d439d013bd94bc856c29aba36ce3d3
-
SHA256
0dbd99dde1de7165ccde4c0b87b7c533fb79fb3c99e59356a23f74f939d7a32d
-
SHA512
31e10adde937c0f0131928c55bbfe96377c26d03bee8e17598fdbd818a859ebd2cb3e76ac9fe25c342732061774fb58a1086dcf9910da7e25225fe9addd0011e
-
SSDEEP
12288:WyW11Sh2iNw/yBLfbBMKkWudtyH62otT3nV431hP7kH0tiYR9yqg2aVmADYZr1S:IDw1G/y5fbGKRud8H62otT3G1hgM3Ro2
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-