General
-
Target
swift copy.exe
-
Size
684KB
-
Sample
240510-kg29rada3s
-
MD5
a92d8ccd3f38a76aa886072adf9c1c94
-
SHA1
f8c6907b69f6f828c3bf9a7a0f850c36e215f315
-
SHA256
37c5d5a6008968981d866924fd7af33224f8c44505b381aac2fecec0468cb241
-
SHA512
23460c4d395796c7773d754b64748b5112270a6a7fe28246a9eae8523a30cc05221f0f923a49ddd72aca2cf0c1156a3e9b5346846071049eb427cbb58e8ca460
-
SSDEEP
12288:sjuhnDveLAfN31k+iYghBUGCypYWGYvGRfGSuIiupVH2Qn:xnDv513W+iYghBUGdpxHvufxZkQn
Static task
static1
Behavioral task
behavioral1
Sample
swift copy.exe
Resource
win7-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.starmech.in - Port:
587 - Username:
[email protected] - Password:
gaging@2022 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.starmech.in - Port:
587 - Username:
[email protected] - Password:
gaging@2022
Targets
-
-
Target
swift copy.exe
-
Size
684KB
-
MD5
a92d8ccd3f38a76aa886072adf9c1c94
-
SHA1
f8c6907b69f6f828c3bf9a7a0f850c36e215f315
-
SHA256
37c5d5a6008968981d866924fd7af33224f8c44505b381aac2fecec0468cb241
-
SHA512
23460c4d395796c7773d754b64748b5112270a6a7fe28246a9eae8523a30cc05221f0f923a49ddd72aca2cf0c1156a3e9b5346846071049eb427cbb58e8ca460
-
SSDEEP
12288:sjuhnDveLAfN31k+iYghBUGCypYWGYvGRfGSuIiupVH2Qn:xnDv513W+iYghBUGdpxHvufxZkQn
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-