General
-
Target
4e1f370a42b366e44b0566e3f0d5d97f53dfe4de399d7c19f62d1a37ec4f19d4.rar
-
Size
645KB
-
Sample
240517-mxqa8seg26
-
MD5
ced8794050dbc6619ce1aa27c03bb90c
-
SHA1
d61d235d81859264f29660345b0e72c8581bf182
-
SHA256
4e1f370a42b366e44b0566e3f0d5d97f53dfe4de399d7c19f62d1a37ec4f19d4
-
SHA512
43b1d4a165eaa60e5339eff6ba6d705085de25e04b06802679114cb4f9e49f81ec60d53e06b4c574744c54f96855356ebd7949c36340ad47de7d06580352948e
-
SSDEEP
12288:EqdUAVzBfVYBfpqsg0bh4MD2xEjVfBWY4ye049rFOE51JkVmZ2Y8EEN9mbdG0DsR:tjVxVYBfpqZLMfjVX/ir5JbZcvN9mJGp
Static task
static1
Behavioral task
behavioral1
Sample
PO240448.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
PO240448.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
PO240448.exe
-
Size
782KB
-
MD5
22d6025454c3789c70b9c7ea558dac32
-
SHA1
d32949ac15ac17560b9466506626c1064a48c4d2
-
SHA256
e967eb5ff57e890dc8aa2bfc44a97c5016fd2c514590be458e21cfff334df6fb
-
SHA512
763dc56507e7f4eec0ffabeaf460560d0e9ede28845504a990a6a6b55fbc44934385820dfce10b5ae3b782827e88b13cfd5b6202deff368a1b9eab2711aac7b6
-
SSDEEP
12288:1h94c3k7rl7c0IU4mddv6MirKqpSKutwa4fsF39uEFtrZjaoxYFGIuFa0z/6Jt+c:j8vlrXYLuKaQqog3+hFGIuvot+lS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-