General
-
Target
8a35b04d761974026b7ce1aabee482098b818b0c4bde1598525b02a017d0a381
-
Size
728KB
-
Sample
240427-bpwmhagh2v
-
MD5
1745d551dd04c80e5e2e1374249454b9
-
SHA1
9c5c8814cd5697b31ae2068fbe507912e1520bf6
-
SHA256
8a35b04d761974026b7ce1aabee482098b818b0c4bde1598525b02a017d0a381
-
SHA512
2db6d49edcc4f89e1ea1492fe953c47b76b7da9f1e4ee118808267d300ae8a7e63de43345fd3e310b8d64be810cd41ccd56de71c3ec3956dec22c2739d690066
-
SSDEEP
12288:XmE6B1kNI1H6totwDsMpV3+uLjmNjJaHTW/RLlfIvvqn2GWKnqHv1qS:XmFB1KIxOomgMzuuLjmNlaARLlwU2GWd
Static task
static1
Behavioral task
behavioral1
Sample
8a35b04d761974026b7ce1aabee482098b818b0c4bde1598525b02a017d0a381.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8a35b04d761974026b7ce1aabee482098b818b0c4bde1598525b02a017d0a381.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
dKjVwpK4 dKjVwpK4 dKjVwpK4 - Email To:
[email protected]
Targets
-
-
Target
8a35b04d761974026b7ce1aabee482098b818b0c4bde1598525b02a017d0a381
-
Size
728KB
-
MD5
1745d551dd04c80e5e2e1374249454b9
-
SHA1
9c5c8814cd5697b31ae2068fbe507912e1520bf6
-
SHA256
8a35b04d761974026b7ce1aabee482098b818b0c4bde1598525b02a017d0a381
-
SHA512
2db6d49edcc4f89e1ea1492fe953c47b76b7da9f1e4ee118808267d300ae8a7e63de43345fd3e310b8d64be810cd41ccd56de71c3ec3956dec22c2739d690066
-
SSDEEP
12288:XmE6B1kNI1H6totwDsMpV3+uLjmNjJaHTW/RLlfIvvqn2GWKnqHv1qS:XmFB1KIxOomgMzuuLjmNlaARLlwU2GWd
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-