General
-
Target
7e82648e3ef3dbd61b8770817368ab2a475a2a7e0409acc7be80b725f72d03bd
-
Size
5KB
-
Sample
240521-ef3k8sha4y
-
MD5
9bb236cdb3b35307af7d461c7fb89080
-
SHA1
c15e1237916d8b15f6123b1f5fe71bea8ca05145
-
SHA256
7e82648e3ef3dbd61b8770817368ab2a475a2a7e0409acc7be80b725f72d03bd
-
SHA512
ce235a07bde29a9317cde50b23f2b84b20c9463cce0f8a63f37385f03936b232029631596b7aab16137dacc6257478d805d73fef117f686e1c8a981010e739fc
-
SSDEEP
96:QqROsb4v4l8zpMXx1LGkAo2ccqknNjD4VesDn5eoxDdHZ1bte+drO8CDnlufp:QTyK4l8za/LGAcqwD477fFLbte+U8CD+
Static task
static1
Behavioral task
behavioral1
Sample
7e82648e3ef3dbd61b8770817368ab2a475a2a7e0409acc7be80b725f72d03bd.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7e82648e3ef3dbd61b8770817368ab2a475a2a7e0409acc7be80b725f72d03bd.vbs
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.raczki.pl - Port:
587 - Username:
[email protected] - Password:
obslugaradygminy - Email To:
[email protected]
Targets
-
-
Target
7e82648e3ef3dbd61b8770817368ab2a475a2a7e0409acc7be80b725f72d03bd
-
Size
5KB
-
MD5
9bb236cdb3b35307af7d461c7fb89080
-
SHA1
c15e1237916d8b15f6123b1f5fe71bea8ca05145
-
SHA256
7e82648e3ef3dbd61b8770817368ab2a475a2a7e0409acc7be80b725f72d03bd
-
SHA512
ce235a07bde29a9317cde50b23f2b84b20c9463cce0f8a63f37385f03936b232029631596b7aab16137dacc6257478d805d73fef117f686e1c8a981010e739fc
-
SSDEEP
96:QqROsb4v4l8zpMXx1LGkAo2ccqknNjD4VesDn5eoxDdHZ1bte+drO8CDnlufp:QTyK4l8za/LGAcqwD477fFLbte+U8CD+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-