General
-
Target
5617a17faab361c772af5ec1b640097706a850742cd0fe040784c1a49ada20eb
-
Size
714KB
-
Sample
240521-cdnceseh2y
-
MD5
8c1ade64563e1d563569198fbef99347
-
SHA1
3247ea6bd149ed55884c6b1e4f0cdd2c5dae057e
-
SHA256
5617a17faab361c772af5ec1b640097706a850742cd0fe040784c1a49ada20eb
-
SHA512
4b7b87bf1ff17f1af9b7655b4962851b5cecc57ae1c6dff9b3a065db4da7f90b0a80bb77e19854cda474e176348612656ea57e11c2ab1a93e519b5efa1097080
-
SSDEEP
12288:eWET/mr9KJHRNy7DTxuK4VVTIVzWjiLduh5PNAA83mFU8LJYwXfdm7+m+h:eWtd73gh8Vzr5uTP+Ak8FYUfdm7G
Static task
static1
Behavioral task
behavioral1
Sample
5617a17faab361c772af5ec1b640097706a850742cd0fe040784c1a49ada20eb.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.funworld.co.id - Port:
587 - Username:
[email protected] - Password:
fwp123mail - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.funworld.co.id - Port:
587 - Username:
[email protected] - Password:
fwp123mail
Targets
-
-
Target
5617a17faab361c772af5ec1b640097706a850742cd0fe040784c1a49ada20eb
-
Size
714KB
-
MD5
8c1ade64563e1d563569198fbef99347
-
SHA1
3247ea6bd149ed55884c6b1e4f0cdd2c5dae057e
-
SHA256
5617a17faab361c772af5ec1b640097706a850742cd0fe040784c1a49ada20eb
-
SHA512
4b7b87bf1ff17f1af9b7655b4962851b5cecc57ae1c6dff9b3a065db4da7f90b0a80bb77e19854cda474e176348612656ea57e11c2ab1a93e519b5efa1097080
-
SSDEEP
12288:eWET/mr9KJHRNy7DTxuK4VVTIVzWjiLduh5PNAA83mFU8LJYwXfdm7+m+h:eWtd73gh8Vzr5uTP+Ak8FYUfdm7G
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-