General
-
Target
62a80186b84707358820cfd1ec83dd74c4ab28984aab4456876498a18897966c.z
-
Size
665KB
-
Sample
240517-ah4tvsgb6z
-
MD5
0716aa09b8c5bd6f508adc690e416059
-
SHA1
52d2360145ed8b84dd61a0886507dcfe282e7095
-
SHA256
62a80186b84707358820cfd1ec83dd74c4ab28984aab4456876498a18897966c
-
SHA512
ddaaaf375cb3fd09255c80d81d44b23419ea6163ac86cc343d22b21dc3089505882b656da086c79cdf6d3243d521ea82f391b6fd53b16bfb0c3fc17a1969067e
-
SSDEEP
12288:WyASA5xNCDEs51VvqcWNvBewi7WLHNGB0h1xMzljtgMcJD28gpubxYk5P3GrP/Ou:fuzYD351VvkNpewiqLHN2hgMcDgpU2k8
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Quotation.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sara.ind.br - Port:
587 - Username:
[email protected] - Password:
Ale-1988 - Email To:
[email protected]
Targets
-
-
Target
Quotation.exe
-
Size
696KB
-
MD5
4f1e4c96e3a5555a2c22f145df3894e8
-
SHA1
2936fd5ee84724b1e8956985c95b6b5b0cbfde68
-
SHA256
a020a465557525b5d64fefc01a74348e5c8e5bbbbe2c01a8b99da32b1cd931d4
-
SHA512
9dc8fdbdff6c9d7d9dd19aee84c72edc1f64449088cd217822b7a9b510f62f8e17d2aeca5a181799b75c4fb1131ead9f04a132daf0596c44fa5fc57c5e4ffd8a
-
SSDEEP
12288:p5F6HkkoFlJTQVqywuLPpzYrsomb3QrUGMRm68sqGgNCp7G1PwQsbagVLu/:p+uJTQzwoxsxDU//xqGUCp7G1PhM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-