General
-
Target
76fac9c0e5dcafca6314bf4b03f6c83ebe1b7e609774ada1cb4db6fffbab900e
-
Size
674KB
-
Sample
240417-pyhznahb3t
-
MD5
ded2a1d49fec73f25459e8d00b4c6a12
-
SHA1
c03d2eb7c8b302d0a8be98c8a8e41447fc3e7c13
-
SHA256
76fac9c0e5dcafca6314bf4b03f6c83ebe1b7e609774ada1cb4db6fffbab900e
-
SHA512
7c74a4856315af44a8717a359742fab6278aed01488a726ff3f3f096cad6b4f701276ac6d930567c14d59196a1adbcfe3a3f63f56f5e660f117132ad77cf989e
-
SSDEEP
12288:nbGP5aM49dPzkjYmM6r7w9o4lFpCMlVvLauBAJf3L1wdFXDXj/r:bY56DgjCr9Z/+LmdFXDXjD
Static task
static1
Behavioral task
behavioral1
Sample
b2e2738e3a2c2553a1318c454330948cf4c14f2f1b07b64e4a0689aefb4c4c88.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b2e2738e3a2c2553a1318c454330948cf4c14f2f1b07b64e4a0689aefb4c4c88.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
PMOYQrU0 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
PMOYQrU0
Targets
-
-
Target
b2e2738e3a2c2553a1318c454330948cf4c14f2f1b07b64e4a0689aefb4c4c88.exe
-
Size
775KB
-
MD5
dfaff680dc9f43287b8be3c64b038de3
-
SHA1
63d7f714e437867a48749cb0e341b04788d2d1a7
-
SHA256
b2e2738e3a2c2553a1318c454330948cf4c14f2f1b07b64e4a0689aefb4c4c88
-
SHA512
e41847646876f5bd6e5e7e585df646cb8eb48c4f621843c56ece5bad4634e09edd58bf580647a404f222cd86dcb68d9be77d0729b69ab6427a4c830412ee5851
-
SSDEEP
24576:WBhoOBrBlu10U9BJceWJEya3HF+IBXXm9:W40BluZ9BJd93b9o
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-