General
-
Target
cc1402d5aa805ba0388e53cf51d075ce8eda9661afba3832d4356f5b16a7ba08
-
Size
689KB
-
Sample
240329-br2ljadg8t
-
MD5
2f4cba8ab7e60939af72d2ba6c35e144
-
SHA1
6f2de99caafe01e9e74f25cc932c2e72a15da575
-
SHA256
cc1402d5aa805ba0388e53cf51d075ce8eda9661afba3832d4356f5b16a7ba08
-
SHA512
8c3c1dfac4f0d843e6636a745b4d0eaeb5dc5be21dd56da4c0b7af92ac207727d8e0f8dc0bbfd3acba6591a336ddf09e243452684eb1e03cd7d65fcf619ce754
-
SSDEEP
12288:q/VN0YOwqOp9TbVLiFl/KRQNTEj9rgWON9r1mLz8ar0s6PTQVBu:aO7MRL+xoQNn9BMgs6rY
Static task
static1
Behavioral task
behavioral1
Sample
cc1402d5aa805ba0388e53cf51d075ce8eda9661afba3832d4356f5b16a7ba08.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc1402d5aa805ba0388e53cf51d075ce8eda9661afba3832d4356f5b16a7ba08.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
phoenixblowers.com - Port:
587 - Username:
[email protected] - Password:
Officeback@2022# - Email To:
[email protected]
Targets
-
-
Target
cc1402d5aa805ba0388e53cf51d075ce8eda9661afba3832d4356f5b16a7ba08
-
Size
689KB
-
MD5
2f4cba8ab7e60939af72d2ba6c35e144
-
SHA1
6f2de99caafe01e9e74f25cc932c2e72a15da575
-
SHA256
cc1402d5aa805ba0388e53cf51d075ce8eda9661afba3832d4356f5b16a7ba08
-
SHA512
8c3c1dfac4f0d843e6636a745b4d0eaeb5dc5be21dd56da4c0b7af92ac207727d8e0f8dc0bbfd3acba6591a336ddf09e243452684eb1e03cd7d65fcf619ce754
-
SSDEEP
12288:q/VN0YOwqOp9TbVLiFl/KRQNTEj9rgWON9r1mLz8ar0s6PTQVBu:aO7MRL+xoQNn9BMgs6rY
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-