General
-
Target
69822626c595c1623aba7a7935b6f7f20883a4adb28d233c520025c86009120a
-
Size
677KB
-
Sample
240417-qe5jzsac8y
-
MD5
669dd6b2f1fa73e07d0aa9815d679085
-
SHA1
bfdff93ecf265ea2682a0c66e95ec1cca4ef0fb1
-
SHA256
69822626c595c1623aba7a7935b6f7f20883a4adb28d233c520025c86009120a
-
SHA512
51b7820b61aed0ca7bc841ca386932cd6a1d3436bde3d794ca0c4e36bb142259a2a4fb65f3daa99910b875095a460e06fb3b07d69124ab3896101a80628c04c0
-
SSDEEP
12288:cokyCcH38IRYBy3NzQK/JdA6nthvM/3YZdGigRKBllD60Eh/KIZ2Wfw:cokEH3ug3NdfpthCoPVg0Bf+0A74sw
Static task
static1
Behavioral task
behavioral1
Sample
63235afcdd767af4bb5bd09488642bbdfb0124e9b4066d00b4815050faae9079.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63235afcdd767af4bb5bd09488642bbdfb0124e9b4066d00b4815050faae9079.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.hoangtruongphat.com - Port:
587 - Username:
[email protected] - Password:
hoangtruongphat818
Extracted
agenttesla
Protocol: smtp- Host:
mail.hoangtruongphat.com - Port:
587 - Username:
[email protected] - Password:
hoangtruongphat818 - Email To:
[email protected]
Targets
-
-
Target
63235afcdd767af4bb5bd09488642bbdfb0124e9b4066d00b4815050faae9079.exe
-
Size
740KB
-
MD5
172ee9c18f5ccdc214e7beebcf9d8778
-
SHA1
66ac5a38d22c834aa3672961d46ff111bf67e72c
-
SHA256
63235afcdd767af4bb5bd09488642bbdfb0124e9b4066d00b4815050faae9079
-
SHA512
54a83a65eeeca1821b89d809ea730d640fd9511e2b29f58009eb3d8138968c28f58fbd02e08552c4ca7a0828326a8b9649c2fe146aefd0e7a318d855fde11e18
-
SSDEEP
12288:bSG0YOwqyjo4Gzzsj+YuFVQMJ2FE0KBxHPhzbwxwJlCMo1FPpXPtH:OWO7yn+Yucbex9wqJlz
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-