General
-
Target
8d309a7666cf1cbed73ba8589f2b1756042a976fbba1c7bc870519a50281be47
-
Size
721KB
-
Sample
240522-bhqsnsff9s
-
MD5
88e7f3f8fd5231cde7d87733b62849bf
-
SHA1
5be01caa2dccf8b6dbc9dda911f79c008f9a2115
-
SHA256
8d309a7666cf1cbed73ba8589f2b1756042a976fbba1c7bc870519a50281be47
-
SHA512
e9014c3642529cd1da2d988d7e04d55fa81b9c108c62a9bd28e672e6113a953ef491141845e481e7684eff9bb8622a3fdb5cd75090adddb64d210182a7bb2b20
-
SSDEEP
12288:Yb8EDVfbFfLR9YstBpvTSrj/6SdkgRK+Pm3ggWkUWmg72QZHCnbwzY:zq91zYstBprYjrd/P7w7vHCnbc
Static task
static1
Behavioral task
behavioral1
Sample
8d309a7666cf1cbed73ba8589f2b1756042a976fbba1c7bc870519a50281be47.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
aYl@txL3 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
aYl@txL3
Targets
-
-
Target
8d309a7666cf1cbed73ba8589f2b1756042a976fbba1c7bc870519a50281be47
-
Size
721KB
-
MD5
88e7f3f8fd5231cde7d87733b62849bf
-
SHA1
5be01caa2dccf8b6dbc9dda911f79c008f9a2115
-
SHA256
8d309a7666cf1cbed73ba8589f2b1756042a976fbba1c7bc870519a50281be47
-
SHA512
e9014c3642529cd1da2d988d7e04d55fa81b9c108c62a9bd28e672e6113a953ef491141845e481e7684eff9bb8622a3fdb5cd75090adddb64d210182a7bb2b20
-
SSDEEP
12288:Yb8EDVfbFfLR9YstBpvTSrj/6SdkgRK+Pm3ggWkUWmg72QZHCnbwzY:zq91zYstBprYjrd/P7w7vHCnbc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-