General
-
Target
4575f34cefb356938eed8e9591a627b429c5d5badd0755b1b6bf54750af16fde
-
Size
773KB
-
Sample
240522-bnfjwsfh5y
-
MD5
3008d929bd31e9311eb2e3c193ecc032
-
SHA1
18208890d26551c15479033a8143156d133966ca
-
SHA256
4575f34cefb356938eed8e9591a627b429c5d5badd0755b1b6bf54750af16fde
-
SHA512
5ee636c57f28cef8356468e9b13543e9242ea627983b736115b03965eac73ad168dc723db9a04b6950af942daf521c1db11727aa0a0be3d6d8109ce37fac4c13
-
SSDEEP
12288:hsFbsfI8Z1gMFVobi/Wp4LC2op1w97Kihz6BxZfZLkHPqCJiV17/yeiGdDr:h0bsfI6dFqbR1w97T2FZLkvq3Dr
Static task
static1
Behavioral task
behavioral1
Sample
4575f34cefb356938eed8e9591a627b429c5d5badd0755b1b6bf54750af16fde.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4575f34cefb356938eed8e9591a627b429c5d5badd0755b1b6bf54750af16fde.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
xxtovlhjahfikslt - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
xxtovlhjahfikslt
Targets
-
-
Target
4575f34cefb356938eed8e9591a627b429c5d5badd0755b1b6bf54750af16fde
-
Size
773KB
-
MD5
3008d929bd31e9311eb2e3c193ecc032
-
SHA1
18208890d26551c15479033a8143156d133966ca
-
SHA256
4575f34cefb356938eed8e9591a627b429c5d5badd0755b1b6bf54750af16fde
-
SHA512
5ee636c57f28cef8356468e9b13543e9242ea627983b736115b03965eac73ad168dc723db9a04b6950af942daf521c1db11727aa0a0be3d6d8109ce37fac4c13
-
SSDEEP
12288:hsFbsfI8Z1gMFVobi/Wp4LC2op1w97Kihz6BxZfZLkHPqCJiV17/yeiGdDr:h0bsfI6dFqbR1w97T2FZLkvq3Dr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-