General
-
Target
0a587dc9572e769d5263668453663402c91692a07caaa0ef52032b72c4b76470
-
Size
768KB
-
Sample
240522-b766ysge26
-
MD5
07ae063e91c1a35cea251b0ec2153d08
-
SHA1
30c5a00dbf9079fd5b866c6d249a7bd2e09a305e
-
SHA256
0a587dc9572e769d5263668453663402c91692a07caaa0ef52032b72c4b76470
-
SHA512
aa4747a36c8a03f9679ce58284945873556797f7296e58cf9c4919f7ea5a623177828a98a1d9033a7d99681c131baad315dcae1ee2cc5143b132b10f41cd1b81
-
SSDEEP
24576:a24b/zwoK/Lx5HxOZPOgMq49D0kNTIHyEGoNFcbbpZ:a24b/zwXoPOg6oehToN83
Static task
static1
Behavioral task
behavioral1
Sample
ESY61093I5N01.exe
Resource
win7-20231129-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cozuns.com - Port:
587 - Username:
[email protected] - Password:
Ku;_MUOVC3;E - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
cozuns.com - Port:
587 - Username:
[email protected] - Password:
Ku;_MUOVC3;E
Targets
-
-
Target
ESY61093I5N01.exe
-
Size
836KB
-
MD5
9b2e2e8f8744108fda24cfeb7c90fbf1
-
SHA1
e8361e5daf928bdf883fd61314d26c6c05dcee48
-
SHA256
1298254d450918ec0d6a4b5d5c433379ab4dd2400f05faaac525a5b30212659e
-
SHA512
a2ef8801e9c28929f5a5ed03d25bec151c225b79cdeb1f71e4e56e282778a1c4d8450d7d15001cd44b9abdd039e0ac5cf6232095dafa8eb04f5ffbb90660d913
-
SSDEEP
24576:Cw4bjw4bp/LxjHlOZBO+Mo49/0a/F8xsKNMD7:Cw4bjw4bbkBO+OMX3a
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-