General
-
Target
c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c
-
Size
697KB
-
Sample
240430-bg56zafg57
-
MD5
ac26d2cbb10147452d05954370444a1b
-
SHA1
64257dbb911889303be1ed73518fa9525e068428
-
SHA256
c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c
-
SHA512
043d49cfe502e5f930d5c6c1b43d2cf07ac1fa97044077373f1cafcbf8623c2cc5fa1a99a022fa00ebefb7bd734cdf38265ac29804e328ef8c797c1318562899
-
SSDEEP
12288:1+DbgvUB778Qeexx1rNUCDVCLU5uf2tkJCwON8/aUHOYtFsBnTadozPP3JCrhd:UgsBZj9NUHbRJMNfUlkTaSzPP0hd
Static task
static1
Behavioral task
behavioral1
Sample
c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
PMOYQrU0 - Email To:
[email protected]
Targets
-
-
Target
c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c
-
Size
697KB
-
MD5
ac26d2cbb10147452d05954370444a1b
-
SHA1
64257dbb911889303be1ed73518fa9525e068428
-
SHA256
c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c
-
SHA512
043d49cfe502e5f930d5c6c1b43d2cf07ac1fa97044077373f1cafcbf8623c2cc5fa1a99a022fa00ebefb7bd734cdf38265ac29804e328ef8c797c1318562899
-
SSDEEP
12288:1+DbgvUB778Qeexx1rNUCDVCLU5uf2tkJCwON8/aUHOYtFsBnTadozPP3JCrhd:UgsBZj9NUHbRJMNfUlkTaSzPP0hd
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-