General
-
Target
08f1b04853a350b17b32bf9899000fc21c97b1fe3c35df93a2ed7aedb2bdd4b7
-
Size
836KB
-
Sample
240522-btt98sfh76
-
MD5
c852c2abf287e6973715083ea3f249be
-
SHA1
311cdeea724a48f244e8e3a8ac6ba6fcefc422c8
-
SHA256
08f1b04853a350b17b32bf9899000fc21c97b1fe3c35df93a2ed7aedb2bdd4b7
-
SHA512
ce7266d96b20b59ab5d8eb135153ea567082ea5544002e319e5d640c0cdef0bf3a20744fb808a9e4d95d5420a22dfefa3d54f64419642a666eb9d712e45cc582
-
SSDEEP
24576:zw4bjw4bY0PIOTULiwy36WtVa4pLmlm7:zw4bjw4bY03oLiwstVdpag
Static task
static1
Behavioral task
behavioral1
Sample
08f1b04853a350b17b32bf9899000fc21c97b1fe3c35df93a2ed7aedb2bdd4b7.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cash4cars.nz - Port:
587 - Username:
[email protected] - Password:
logs2024! - Email To:
[email protected]
Targets
-
-
Target
08f1b04853a350b17b32bf9899000fc21c97b1fe3c35df93a2ed7aedb2bdd4b7
-
Size
836KB
-
MD5
c852c2abf287e6973715083ea3f249be
-
SHA1
311cdeea724a48f244e8e3a8ac6ba6fcefc422c8
-
SHA256
08f1b04853a350b17b32bf9899000fc21c97b1fe3c35df93a2ed7aedb2bdd4b7
-
SHA512
ce7266d96b20b59ab5d8eb135153ea567082ea5544002e319e5d640c0cdef0bf3a20744fb808a9e4d95d5420a22dfefa3d54f64419642a666eb9d712e45cc582
-
SSDEEP
24576:zw4bjw4bY0PIOTULiwy36WtVa4pLmlm7:zw4bjw4bY03oLiwstVdpag
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-