General
-
Target
3351d4d1bb8476be26d173049d3f57190781ef4fd290f90a9b68c9695867c7c6.exe
-
Size
854KB
-
Sample
240503-mfnfbaed62
-
MD5
eef1afa5cd2872b302f782c034059d32
-
SHA1
6e74b1ca1d95d4bba01c363654b9be0b0e1152fd
-
SHA256
3351d4d1bb8476be26d173049d3f57190781ef4fd290f90a9b68c9695867c7c6
-
SHA512
1cd207b0b38cfa58465fe5da6d461d366333ead4f97b7180552468326a31233c55e8b48a105959d9abede5362aac3579ed9c4bf7e7d60d3cf0ea734dc0e1bd21
-
SSDEEP
12288:2vGoVgWuB778QenuMpI7MbPjSliRDAubg//jhttpvot+PEUPvu7NuDNrB3YRaGyq:ZB6uFMbPjCiRNbgDPtpvKs9PbPPPsH3
Static task
static1
Behavioral task
behavioral1
Sample
3351d4d1bb8476be26d173049d3f57190781ef4fd290f90a9b68c9695867c7c6.exe
Resource
win7-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.hoangtruongphat.com - Port:
587 - Username:
[email protected] - Password:
hoangtruongphat818 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.hoangtruongphat.com - Port:
587 - Username:
[email protected] - Password:
hoangtruongphat818
Targets
-
-
Target
3351d4d1bb8476be26d173049d3f57190781ef4fd290f90a9b68c9695867c7c6.exe
-
Size
854KB
-
MD5
eef1afa5cd2872b302f782c034059d32
-
SHA1
6e74b1ca1d95d4bba01c363654b9be0b0e1152fd
-
SHA256
3351d4d1bb8476be26d173049d3f57190781ef4fd290f90a9b68c9695867c7c6
-
SHA512
1cd207b0b38cfa58465fe5da6d461d366333ead4f97b7180552468326a31233c55e8b48a105959d9abede5362aac3579ed9c4bf7e7d60d3cf0ea734dc0e1bd21
-
SSDEEP
12288:2vGoVgWuB778QenuMpI7MbPjSliRDAubg//jhttpvot+PEUPvu7NuDNrB3YRaGyq:ZB6uFMbPjCiRNbgDPtpvKs9PbPPPsH3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-