General
-
Target
95ee433b86af5f7dd0aee255ec685b83658ebdf24821d6feca7e978f41aafa7f
-
Size
824KB
-
Sample
240427-b8xnxagf28
-
MD5
f681bfe9067146c00c505fb432b76954
-
SHA1
b8964139f6131d04d82a1d765119f2de56d8d19d
-
SHA256
95ee433b86af5f7dd0aee255ec685b83658ebdf24821d6feca7e978f41aafa7f
-
SHA512
b628c25a0b3057bbe4dba888b72c5ab93212c840b4109662de761892097948aa7a027a065596b8d9640cc8b6983cf244c51d1c0a3ed094d84045b1aa65a92e1f
-
SSDEEP
24576:1CPjKr5BNDUAOwzkMtykVufX50rF2zFTp0Ot+Rp:ck5BNA3w4E3m26Ft0Ot2
Static task
static1
Behavioral task
behavioral1
Sample
95ee433b86af5f7dd0aee255ec685b83658ebdf24821d6feca7e978f41aafa7f.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
95ee433b86af5f7dd0aee255ec685b83658ebdf24821d6feca7e978f41aafa7f.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
u(!IUDW7 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
u(!IUDW7
Targets
-
-
Target
95ee433b86af5f7dd0aee255ec685b83658ebdf24821d6feca7e978f41aafa7f
-
Size
824KB
-
MD5
f681bfe9067146c00c505fb432b76954
-
SHA1
b8964139f6131d04d82a1d765119f2de56d8d19d
-
SHA256
95ee433b86af5f7dd0aee255ec685b83658ebdf24821d6feca7e978f41aafa7f
-
SHA512
b628c25a0b3057bbe4dba888b72c5ab93212c840b4109662de761892097948aa7a027a065596b8d9640cc8b6983cf244c51d1c0a3ed094d84045b1aa65a92e1f
-
SSDEEP
24576:1CPjKr5BNDUAOwzkMtykVufX50rF2zFTp0Ot+Rp:ck5BNA3w4E3m26Ft0Ot2
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-