General
-
Target
d8337b177f29c1422033dbae7b4b1191f9721c54ce02885318ca80aefa446964
-
Size
296KB
-
Sample
240427-b6lhvshd5w
-
MD5
51cddcbd39641c958d5906dd9c9080ad
-
SHA1
6dc67e50fe2c5259ea0a0364475d2a9558a1fe3a
-
SHA256
d8337b177f29c1422033dbae7b4b1191f9721c54ce02885318ca80aefa446964
-
SHA512
2c03cb2bdfde6838ab0ed24ea310aa6bcfdc5e30a57c861bf9cdca872e098c5fc80ebe664459df5836dcc2bdcc35618800628b9d9afefadc2227ff8de657cae2
-
SSDEEP
6144:2c7tvCwj2O9lT+TIvZCoJZP2xwrpuHeAFUhhmPhLkJRJ:vKwRwkImzs/Mh2gJP
Static task
static1
Behavioral task
behavioral1
Sample
d8337b177f29c1422033dbae7b4b1191f9721c54ce02885318ca80aefa446964.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d8337b177f29c1422033dbae7b4b1191f9721c54ce02885318ca80aefa446964.vbs
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
proglass.com.sg - Port:
587 - Username:
[email protected] - Password:
BillionPay$ - Email To:
[email protected]
Targets
-
-
Target
d8337b177f29c1422033dbae7b4b1191f9721c54ce02885318ca80aefa446964
-
Size
296KB
-
MD5
51cddcbd39641c958d5906dd9c9080ad
-
SHA1
6dc67e50fe2c5259ea0a0364475d2a9558a1fe3a
-
SHA256
d8337b177f29c1422033dbae7b4b1191f9721c54ce02885318ca80aefa446964
-
SHA512
2c03cb2bdfde6838ab0ed24ea310aa6bcfdc5e30a57c861bf9cdca872e098c5fc80ebe664459df5836dcc2bdcc35618800628b9d9afefadc2227ff8de657cae2
-
SSDEEP
6144:2c7tvCwj2O9lT+TIvZCoJZP2xwrpuHeAFUhhmPhLkJRJ:vKwRwkImzs/Mh2gJP
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-