General
-
Target
e15e52fcb81395733818343b8ece6377.bin
-
Size
6KB
-
Sample
240509-d33n3sgc7s
-
MD5
8a0872548f88815f1b3ab1a728e1893d
-
SHA1
72e74302fab2bdc099374537d64b037f8082ff20
-
SHA256
3226afa8c695aac5717295d0cdb984cf1a37023e49c8301c9ca722c133e9a8b6
-
SHA512
fd94016f0afd671cec249ae7f686024ed80a76090e2cefc7fccd415a813145e7baf786ab3181f0c9835402d3aaab6b7ba9738066b3cf3e2080ec976e3cec00be
-
SSDEEP
96:7VarmLEw74vE6qipPru+aQKuO+py+flx6NNceBqqsh+TEjf+G0QY3Lr3/Yx+boag:3R6qF+NKF+c66NNcqNgTyQiQEw
Static task
static1
Behavioral task
behavioral1
Sample
46a58ae7fa97e17a30c6031d4777fd9afd0a64385b131abd18750310a8223ed1.vbs
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
46a58ae7fa97e17a30c6031d4777fd9afd0a64385b131abd18750310a8223ed1.vbs
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.medicalhome.com.pe - Port:
587 - Username:
[email protected] - Password:
MHinfo01 - Email To:
[email protected]
Targets
-
-
Target
46a58ae7fa97e17a30c6031d4777fd9afd0a64385b131abd18750310a8223ed1.vbs
-
Size
10KB
-
MD5
e15e52fcb81395733818343b8ece6377
-
SHA1
e595c6f83b63de54e8a62b38ce51b6e75e40d14a
-
SHA256
46a58ae7fa97e17a30c6031d4777fd9afd0a64385b131abd18750310a8223ed1
-
SHA512
eaee0355a05ecbdbdca3e2c17a47aebc987b4e03c2ea44cb8e4f56b67a70e3ecd080b26d10ecde01e3fe626fa42114b3d5ba39fa63b44d25ec48c9ed0f9ed973
-
SSDEEP
192:30BhclM+TvETdQ+aTXtMFEOcKT1cW7C2EV+qNBNQh4b+:k7cPTvETdCUu81cQkN/BK
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-