General
-
Target
975b6520ddcf9fc005dda2f8c077700c90fa13d5fff6f2c160b48b0b16c789c2
-
Size
1.0MB
-
Sample
240522-bjj2hsfg3w
-
MD5
1eb928b69e385c3d1390eb92a069360e
-
SHA1
f26bf21645c1f46a377db738ffd1a21adc2b6ec5
-
SHA256
975b6520ddcf9fc005dda2f8c077700c90fa13d5fff6f2c160b48b0b16c789c2
-
SHA512
922794514e7d030e2b8011527bfe5796cfde3cc6f3070a09095f01fb6b8be55d95d9e7321da3add0075db5474aab3dc419390bfdd9c8280e7d00479356281f07
-
SSDEEP
24576:gMfw4bjw4b+hE+j86xgMEZw4UFhcyOWUNX+094+qwQE75:9w4bjw4bYo6xuChkPB+a4HwL
Static task
static1
Behavioral task
behavioral1
Sample
975b6520ddcf9fc005dda2f8c077700c90fa13d5fff6f2c160b48b0b16c789c2.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
kosraepower.com - Port:
587 - Username:
[email protected] - Password:
Noahmarijun16 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
kosraepower.com - Port:
587 - Username:
[email protected] - Password:
Noahmarijun16
Targets
-
-
Target
975b6520ddcf9fc005dda2f8c077700c90fa13d5fff6f2c160b48b0b16c789c2
-
Size
1.0MB
-
MD5
1eb928b69e385c3d1390eb92a069360e
-
SHA1
f26bf21645c1f46a377db738ffd1a21adc2b6ec5
-
SHA256
975b6520ddcf9fc005dda2f8c077700c90fa13d5fff6f2c160b48b0b16c789c2
-
SHA512
922794514e7d030e2b8011527bfe5796cfde3cc6f3070a09095f01fb6b8be55d95d9e7321da3add0075db5474aab3dc419390bfdd9c8280e7d00479356281f07
-
SSDEEP
24576:gMfw4bjw4b+hE+j86xgMEZw4UFhcyOWUNX+094+qwQE75:9w4bjw4bYo6xuChkPB+a4HwL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-