General
-
Target
25a1241fa5efb1cedca9c984dce1f39ff7452b18e33b2368cdc830b7abbe3ea6.exe
-
Size
581KB
-
Sample
240430-bh6twsfg85
-
MD5
3eea1594e18c22765ffaa81a547c2f61
-
SHA1
dbad219d5fa4c3e1dbda63f73d6de0d951ebd5cb
-
SHA256
25a1241fa5efb1cedca9c984dce1f39ff7452b18e33b2368cdc830b7abbe3ea6
-
SHA512
5a4e637829b362e1db5723a47d99c41eee143faa61054aa7b4c086d107a7c90132f85565aa8110516e7b3bc60aca82701a17cd640a0fb31b05c6fb2835cba86b
-
SSDEEP
12288:sSwB778QsjYmRQ0vKviVYh3oyMwU2+WvtlO+GjNQ34b:JwBjmxCV3oyMwU2+WV8lxS4b
Static task
static1
Behavioral task
behavioral1
Sample
25a1241fa5efb1cedca9c984dce1f39ff7452b18e33b2368cdc830b7abbe3ea6.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
25a1241fa5efb1cedca9c984dce1f39ff7452b18e33b2368cdc830b7abbe3ea6.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
25a1241fa5efb1cedca9c984dce1f39ff7452b18e33b2368cdc830b7abbe3ea6.exe
-
Size
581KB
-
MD5
3eea1594e18c22765ffaa81a547c2f61
-
SHA1
dbad219d5fa4c3e1dbda63f73d6de0d951ebd5cb
-
SHA256
25a1241fa5efb1cedca9c984dce1f39ff7452b18e33b2368cdc830b7abbe3ea6
-
SHA512
5a4e637829b362e1db5723a47d99c41eee143faa61054aa7b4c086d107a7c90132f85565aa8110516e7b3bc60aca82701a17cd640a0fb31b05c6fb2835cba86b
-
SSDEEP
12288:sSwB778QsjYmRQ0vKviVYh3oyMwU2+WvtlO+GjNQ34b:JwBjmxCV3oyMwU2+WV8lxS4b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-