General
-
Target
f4c7cd384e7e29160e58ff219d7c8791aa935821860cb859ff8c2197571bfb72
-
Size
822KB
-
Sample
240430-b7g7tshc9z
-
MD5
999e747ee26c9101883117b8a88d6a9c
-
SHA1
c9fea49b73ec4f6047c5f556118b3e43ad64f9e6
-
SHA256
f4c7cd384e7e29160e58ff219d7c8791aa935821860cb859ff8c2197571bfb72
-
SHA512
730422262592049ac717501a94cf64bbde23d4a11df04aa26acd2c58170c3c161e9f24733f725455e76b9b4c9d71a5be4156869aebc6bd77ee3e46d1d44a864e
-
SSDEEP
24576:UZmKWd7a44E29ZuF3jGiSxSmPIB/lofv7H5QVe6e:UZg7a4rw2G55QBc7oe6
Static task
static1
Behavioral task
behavioral1
Sample
f4c7cd384e7e29160e58ff219d7c8791aa935821860cb859ff8c2197571bfb72.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4c7cd384e7e29160e58ff219d7c8791aa935821860cb859ff8c2197571bfb72.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
dKjVwpK4 dKjVwpK4 dKjVwpK4 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
dKjVwpK4 dKjVwpK4 dKjVwpK4
Targets
-
-
Target
f4c7cd384e7e29160e58ff219d7c8791aa935821860cb859ff8c2197571bfb72
-
Size
822KB
-
MD5
999e747ee26c9101883117b8a88d6a9c
-
SHA1
c9fea49b73ec4f6047c5f556118b3e43ad64f9e6
-
SHA256
f4c7cd384e7e29160e58ff219d7c8791aa935821860cb859ff8c2197571bfb72
-
SHA512
730422262592049ac717501a94cf64bbde23d4a11df04aa26acd2c58170c3c161e9f24733f725455e76b9b4c9d71a5be4156869aebc6bd77ee3e46d1d44a864e
-
SSDEEP
24576:UZmKWd7a44E29ZuF3jGiSxSmPIB/lofv7H5QVe6e:UZg7a4rw2G55QBc7oe6
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-