General
-
Target
6ef8c66a1958aa5927fc6876db282fd2eabb40aa5155db6807400fc220a2797e
-
Size
1019KB
-
Sample
240428-bpenzscg88
-
MD5
6ad9dfa098e7c9d0fa5758eeb8869fb7
-
SHA1
83422bb95e4c9f9b926ff18fe5dc19e757807825
-
SHA256
6ef8c66a1958aa5927fc6876db282fd2eabb40aa5155db6807400fc220a2797e
-
SHA512
5bcf0e1ed4b3b10b1a5e3c35d7d0e851773d24cc73a86a3b3168ba1f501b8e7f91a60569f725b7b9f3c765c6df882f2b6d39c51bec4654fe754fd0ec2e7ae626
-
SSDEEP
12288:M2pgwJzm3C0X+I6AvtSNY2kIhyZddLvFoJCuDlm/B36zTMX6v2mTPhABNtvDkR:7XzmHHvtG/sLvFo0upIqnT5QBW
Static task
static1
Behavioral task
behavioral1
Sample
6ef8c66a1958aa5927fc6876db282fd2eabb40aa5155db6807400fc220a2797e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6ef8c66a1958aa5927fc6876db282fd2eabb40aa5155db6807400fc220a2797e.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.scgpl.in - Port:
587 - Username:
[email protected] - Password:
$Hetvishwa5271@djd - Email To:
[email protected]
Targets
-
-
Target
6ef8c66a1958aa5927fc6876db282fd2eabb40aa5155db6807400fc220a2797e
-
Size
1019KB
-
MD5
6ad9dfa098e7c9d0fa5758eeb8869fb7
-
SHA1
83422bb95e4c9f9b926ff18fe5dc19e757807825
-
SHA256
6ef8c66a1958aa5927fc6876db282fd2eabb40aa5155db6807400fc220a2797e
-
SHA512
5bcf0e1ed4b3b10b1a5e3c35d7d0e851773d24cc73a86a3b3168ba1f501b8e7f91a60569f725b7b9f3c765c6df882f2b6d39c51bec4654fe754fd0ec2e7ae626
-
SSDEEP
12288:M2pgwJzm3C0X+I6AvtSNY2kIhyZddLvFoJCuDlm/B36zTMX6v2mTPhABNtvDkR:7XzmHHvtG/sLvFo0upIqnT5QBW
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-