General
-
Target
86f2279dcd0fefd01392dda46e202ae5e1528322b34ddf7029ef3efd58b5b45e.exe
-
Size
836KB
-
Sample
240522-r4h8qaeg9s
-
MD5
0668ddb7de67098ce3a2196f81602740
-
SHA1
1e54e23d77360b45a297ee1e4040e51a93fb38f8
-
SHA256
86f2279dcd0fefd01392dda46e202ae5e1528322b34ddf7029ef3efd58b5b45e
-
SHA512
04b1d59543f65533efab5fafbdda3a75feb8bae34b3f91912692b9d46773df2b417e1b672b470d6e565ee5e54c298bf77b37721e6be98a8c4583d4ee94afad2f
-
SSDEEP
12288:i+x504bFtx504bFWxPah3iI6p0lJy5hzmnIFMgKOyg+tlxoJjzX374:Hw4bjw4bZ3k0nmCIFMgxrfn7
Static task
static1
Behavioral task
behavioral1
Sample
86f2279dcd0fefd01392dda46e202ae5e1528322b34ddf7029ef3efd58b5b45e.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Jchalen82 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Jchalen82
Targets
-
-
Target
86f2279dcd0fefd01392dda46e202ae5e1528322b34ddf7029ef3efd58b5b45e.exe
-
Size
836KB
-
MD5
0668ddb7de67098ce3a2196f81602740
-
SHA1
1e54e23d77360b45a297ee1e4040e51a93fb38f8
-
SHA256
86f2279dcd0fefd01392dda46e202ae5e1528322b34ddf7029ef3efd58b5b45e
-
SHA512
04b1d59543f65533efab5fafbdda3a75feb8bae34b3f91912692b9d46773df2b417e1b672b470d6e565ee5e54c298bf77b37721e6be98a8c4583d4ee94afad2f
-
SSDEEP
12288:i+x504bFtx504bFWxPah3iI6p0lJy5hzmnIFMgKOyg+tlxoJjzX374:Hw4bjw4bZ3k0nmCIFMgxrfn7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-