General
-
Target
b939036f2b6757522b3f3be59a38b4d8e0100b23dbeba2074b0af05bb97cb608
-
Size
687KB
-
Sample
240522-bjpl1afg3z
-
MD5
fafeeab4defa8202f4a4511aaeb12171
-
SHA1
22adda5e16b1c893eac440e37879383749f2670d
-
SHA256
b939036f2b6757522b3f3be59a38b4d8e0100b23dbeba2074b0af05bb97cb608
-
SHA512
b68d865295ab06e7103938640ec72c4b8c5087da84a941f17850eb82ca0d54b2b3305c0294d310fe2de036f67560a6dce3ce4d5ab3edcf07e3f6f390df95301c
-
SSDEEP
12288:Q1x504bF9nOO6Fmd+zdOH8jmv40avbwziQspRmJ7PQmVPn8NOyG3sRbT:Q1w4b/nePd68ivt+wB0mbv8NOybRbT
Static task
static1
Behavioral task
behavioral1
Sample
b939036f2b6757522b3f3be59a38b4d8e0100b23dbeba2074b0af05bb97cb608.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.grupoautorep.com - Port:
587 - Username:
[email protected] - Password:
Autorep2023.* - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.grupoautorep.com - Port:
587 - Username:
[email protected] - Password:
Autorep2023.*
Targets
-
-
Target
b939036f2b6757522b3f3be59a38b4d8e0100b23dbeba2074b0af05bb97cb608
-
Size
687KB
-
MD5
fafeeab4defa8202f4a4511aaeb12171
-
SHA1
22adda5e16b1c893eac440e37879383749f2670d
-
SHA256
b939036f2b6757522b3f3be59a38b4d8e0100b23dbeba2074b0af05bb97cb608
-
SHA512
b68d865295ab06e7103938640ec72c4b8c5087da84a941f17850eb82ca0d54b2b3305c0294d310fe2de036f67560a6dce3ce4d5ab3edcf07e3f6f390df95301c
-
SSDEEP
12288:Q1x504bF9nOO6Fmd+zdOH8jmv40avbwziQspRmJ7PQmVPn8NOyG3sRbT:Q1w4b/nePd68ivt+wB0mbv8NOybRbT
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-