General
-
Target
4a8482bb46cf7a8882a22fbe9316d464dda43754497ac257044d8b8589134ee6
-
Size
1.0MB
-
Sample
240417-clbctsah82
-
MD5
09752a03dc3ce4890b90c0e540cea5d7
-
SHA1
abc1084774f52d2738cb17ab0f47727e35b5cef0
-
SHA256
4a8482bb46cf7a8882a22fbe9316d464dda43754497ac257044d8b8589134ee6
-
SHA512
7b058dd97e4879fdc979012fd14f1abf9233eda46d79d02c862311e2b384c12fa682a5e5fb5b6e1aa27d841525bcc9c15b1b3f0303990fa94c57985e938c5360
-
SSDEEP
24576:k7SHe38daZZILe07sg4r5QqChXAYsOojCm0zapfEAcFchqSTGw:kWS8ow56iXSfpwLw
Static task
static1
Behavioral task
behavioral1
Sample
4a8482bb46cf7a8882a22fbe9316d464dda43754497ac257044d8b8589134ee6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a8482bb46cf7a8882a22fbe9316d464dda43754497ac257044d8b8589134ee6.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bestconstructltd.com - Port:
587 - Username:
[email protected] - Password:
Cm54227290 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.bestconstructltd.com - Port:
587 - Username:
[email protected] - Password:
Cm54227290
Targets
-
-
Target
4a8482bb46cf7a8882a22fbe9316d464dda43754497ac257044d8b8589134ee6
-
Size
1.0MB
-
MD5
09752a03dc3ce4890b90c0e540cea5d7
-
SHA1
abc1084774f52d2738cb17ab0f47727e35b5cef0
-
SHA256
4a8482bb46cf7a8882a22fbe9316d464dda43754497ac257044d8b8589134ee6
-
SHA512
7b058dd97e4879fdc979012fd14f1abf9233eda46d79d02c862311e2b384c12fa682a5e5fb5b6e1aa27d841525bcc9c15b1b3f0303990fa94c57985e938c5360
-
SSDEEP
24576:k7SHe38daZZILe07sg4r5QqChXAYsOojCm0zapfEAcFchqSTGw:kWS8ow56iXSfpwLw
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-