General
-
Target
431d88693bfa9779b1ee70c50c74ef961ae9a96d1fb50f6e2bc203a3bd2852ee
-
Size
797KB
-
Sample
240521-b86a2sec87
-
MD5
d622b8ebbfac5db213c53dd40c49e7d7
-
SHA1
a17d31f3690971604c3edce1ebab4613fcb8bd88
-
SHA256
431d88693bfa9779b1ee70c50c74ef961ae9a96d1fb50f6e2bc203a3bd2852ee
-
SHA512
c5b4c4d85db33d87b67d2bfa9fb1c3cb96ea8863efa4a581a639cffd86487f8a50f1459ce8205c4b79fbf372a1eb2554596b16627d92fd3217380cf0c2aad898
-
SSDEEP
12288:qIJWET/mr9K+22BEEzFatnTa3x0ld2n8Iec0uwFVkKKgtGmEGoYmjCc06b7xtVli:VWtb3BEdv/2nxec0uwDkK0IoYSq
Static task
static1
Behavioral task
behavioral1
Sample
431d88693bfa9779b1ee70c50c74ef961ae9a96d1fb50f6e2bc203a3bd2852ee.exe
Resource
win7-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
premium162.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
Look@oursuccess247 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
premium162.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
Look@oursuccess247
Targets
-
-
Target
431d88693bfa9779b1ee70c50c74ef961ae9a96d1fb50f6e2bc203a3bd2852ee
-
Size
797KB
-
MD5
d622b8ebbfac5db213c53dd40c49e7d7
-
SHA1
a17d31f3690971604c3edce1ebab4613fcb8bd88
-
SHA256
431d88693bfa9779b1ee70c50c74ef961ae9a96d1fb50f6e2bc203a3bd2852ee
-
SHA512
c5b4c4d85db33d87b67d2bfa9fb1c3cb96ea8863efa4a581a639cffd86487f8a50f1459ce8205c4b79fbf372a1eb2554596b16627d92fd3217380cf0c2aad898
-
SSDEEP
12288:qIJWET/mr9K+22BEEzFatnTa3x0ld2n8Iec0uwFVkKKgtGmEGoYmjCc06b7xtVli:VWtb3BEdv/2nxec0uwDkK0IoYSq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-