General
-
Target
e967eb5ff57e890dc8aa2bfc44a97c5016fd2c514590be458e21cfff334df6fb.exe
-
Size
782KB
-
Sample
240517-pcckrage4y
-
MD5
22d6025454c3789c70b9c7ea558dac32
-
SHA1
d32949ac15ac17560b9466506626c1064a48c4d2
-
SHA256
e967eb5ff57e890dc8aa2bfc44a97c5016fd2c514590be458e21cfff334df6fb
-
SHA512
763dc56507e7f4eec0ffabeaf460560d0e9ede28845504a990a6a6b55fbc44934385820dfce10b5ae3b782827e88b13cfd5b6202deff368a1b9eab2711aac7b6
-
SSDEEP
12288:1h94c3k7rl7c0IU4mddv6MirKqpSKutwa4fsF39uEFtrZjaoxYFGIuFa0z/6Jt+c:j8vlrXYLuKaQqog3+hFGIuvot+lS
Static task
static1
Behavioral task
behavioral1
Sample
e967eb5ff57e890dc8aa2bfc44a97c5016fd2c514590be458e21cfff334df6fb.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e967eb5ff57e890dc8aa2bfc44a97c5016fd2c514590be458e21cfff334df6fb.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
e967eb5ff57e890dc8aa2bfc44a97c5016fd2c514590be458e21cfff334df6fb.exe
-
Size
782KB
-
MD5
22d6025454c3789c70b9c7ea558dac32
-
SHA1
d32949ac15ac17560b9466506626c1064a48c4d2
-
SHA256
e967eb5ff57e890dc8aa2bfc44a97c5016fd2c514590be458e21cfff334df6fb
-
SHA512
763dc56507e7f4eec0ffabeaf460560d0e9ede28845504a990a6a6b55fbc44934385820dfce10b5ae3b782827e88b13cfd5b6202deff368a1b9eab2711aac7b6
-
SSDEEP
12288:1h94c3k7rl7c0IU4mddv6MirKqpSKutwa4fsF39uEFtrZjaoxYFGIuFa0z/6Jt+c:j8vlrXYLuKaQqog3+hFGIuvot+lS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-