General
-
Target
906cb4d1d82674ca8e0c0614d34af552.bin
-
Size
764KB
-
Sample
240422-b175nsea4z
-
MD5
8d97409e9d0ffd8b9ca45a0e3e6d79d0
-
SHA1
ad7d9c0e3ab119ed1d9124af5386ace48d2f4b3f
-
SHA256
62c476d52ef1c34aa9035228f2c9a88d2a6256ee1c77c69789ac70b3c591fc7d
-
SHA512
7dc40ee5f701e1f1a42b58fe0107e432122d77873c8cf7fe9f284b41f38cd611709acc3587723cc03b04660699abb9b7839c6e3f4bf7f5e67f7fc55d900255cf
-
SSDEEP
12288:wLDMH139teOZlAQAc0lEI0qfpUuivem8abu8tMiaIuk2G+Nb7cn7sh:wXS70KslEGRUumSxq+1eQ
Static task
static1
Behavioral task
behavioral1
Sample
6670de035561ab5f4cd82d89a4ab969b7d8eaf1da047782b37399d79eeb4762e.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6670de035561ab5f4cd82d89a4ab969b7d8eaf1da047782b37399d79eeb4762e.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.hoangtruongphat.com - Port:
587 - Username:
[email protected] - Password:
hoangtruongphat818 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.hoangtruongphat.com - Port:
587 - Username:
[email protected] - Password:
hoangtruongphat818
Targets
-
-
Target
6670de035561ab5f4cd82d89a4ab969b7d8eaf1da047782b37399d79eeb4762e.exe
-
Size
784KB
-
MD5
906cb4d1d82674ca8e0c0614d34af552
-
SHA1
1c38bd8f3122bc9aaf7c2a8968c252ff2b264721
-
SHA256
6670de035561ab5f4cd82d89a4ab969b7d8eaf1da047782b37399d79eeb4762e
-
SHA512
6795637d769a1c0ef52a7e616b7f9f2310ec88889b8220a2d0268bed6a7b04ec0b5391355222b7ab0072c07e12edd2adcdcf8eeecd4a4029f5142fa3dffe7bc6
-
SSDEEP
24576:xXYwIG7RaOvoOnAHRtZbsy1vBF1rG3AbHO7G:zIG7sOvoOnkFwoBLrG3AbHo
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-