General
-
Target
87fb14125ec113a35bba6c66cb928d52db9f87fac5ac28baf96009ce13d8981b
-
Size
649KB
-
Sample
240417-rq87zsdc5y
-
MD5
c5623086c2a01f25d0c91e1615948769
-
SHA1
b4aeaec5dc647f270b099164647fb38b1ad61ba4
-
SHA256
87fb14125ec113a35bba6c66cb928d52db9f87fac5ac28baf96009ce13d8981b
-
SHA512
4a0bb0f4aad282e01b0000160fa05829a64a5c09c01ba18d5453d9f37c0479ce0913b12065921bb3a5468ba6214688b374a0c9f3d0a2bac4a9388bf8ea7a158e
-
SSDEEP
12288:K2jGTsVoojpVrXIv9T+rTDP0vYsQBbQWiPQh7Z+8TjRpSVwiRLqHVkl:K3TsVoQplXC+rTDcv2bQWiPG7ASzPiNX
Static task
static1
Behavioral task
behavioral1
Sample
a471005428df2b40174de80a9d27db29284fb99c8a6a0b167d3e441f8357ea65.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a471005428df2b40174de80a9d27db29284fb99c8a6a0b167d3e441f8357ea65.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.alnahdhagroup.com - Port:
587 - Username:
[email protected] - Password:
[email protected] - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.alnahdhagroup.com - Port:
587 - Username:
[email protected] - Password:
[email protected]
Targets
-
-
Target
a471005428df2b40174de80a9d27db29284fb99c8a6a0b167d3e441f8357ea65.exe
-
Size
673KB
-
MD5
6545c776acd79c87487ccf65e2708693
-
SHA1
d9fe7f08451156c67b84fbedaa51e2fbc06c3eb3
-
SHA256
a471005428df2b40174de80a9d27db29284fb99c8a6a0b167d3e441f8357ea65
-
SHA512
fb987f4121a51c6473d62fcd06b3b3b84a48baf6c8f7c211fdbd09b53b7a2919aaab65008bb0ff239e95c5423014d93ef8c8dfb3481005eb9e8ea8d878566c92
-
SSDEEP
12288:oiD24Clua7GokTDM8dJ6oVx23+NCi8arWT6JZlym7E/3dK35UU:jmuP3M8dJDzK+NR8aCTYe/tKp
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-