General
-
Target
b6d7a0644eb168856fec62e2958b076f7230dafcd655b14f53b3f5813e7cfd62.exe
-
Size
716KB
-
Sample
240521-rwaavahc9y
-
MD5
cd3d96bf2cdd57e03fa908166592ae2e
-
SHA1
23df570704219bb1f7142e5c84c463b38b6fa30f
-
SHA256
b6d7a0644eb168856fec62e2958b076f7230dafcd655b14f53b3f5813e7cfd62
-
SHA512
3ffcb82ccb9a34d2f6babef13c7ebb7ae57893f95c6c74d5f1b1ea9276f3a51542350d43116d455eebd7e6183fb53440d0db2cfebe56579fba607e19acb0db3a
-
SSDEEP
12288:vWET/mr9KGp318ksbyll71co8X25f/zV83LVJ907fUiSd1HdhKHZle1VCXixwVSk:vWt3x6bylhVYLVJ907edRrKjeayxMTeb
Static task
static1
Behavioral task
behavioral1
Sample
b6d7a0644eb168856fec62e2958b076f7230dafcd655b14f53b3f5813e7cfd62.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ifeanyi@12 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ifeanyi@12
Targets
-
-
Target
b6d7a0644eb168856fec62e2958b076f7230dafcd655b14f53b3f5813e7cfd62.exe
-
Size
716KB
-
MD5
cd3d96bf2cdd57e03fa908166592ae2e
-
SHA1
23df570704219bb1f7142e5c84c463b38b6fa30f
-
SHA256
b6d7a0644eb168856fec62e2958b076f7230dafcd655b14f53b3f5813e7cfd62
-
SHA512
3ffcb82ccb9a34d2f6babef13c7ebb7ae57893f95c6c74d5f1b1ea9276f3a51542350d43116d455eebd7e6183fb53440d0db2cfebe56579fba607e19acb0db3a
-
SSDEEP
12288:vWET/mr9KGp318ksbyll71co8X25f/zV83LVJ907fUiSd1HdhKHZle1VCXixwVSk:vWt3x6bylhVYLVJ907edRrKjeayxMTeb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-