General
-
Target
52adc27e384cb4ae0d0e096792526ca660f8b2a42e60d69ffd44e67def0fcf12.exe
-
Size
748KB
-
Sample
240522-r7thvseh83
-
MD5
a7666685c69267f2f9108e319cd0cd38
-
SHA1
feac316461451bcaf6a64ea92217ad8046808844
-
SHA256
52adc27e384cb4ae0d0e096792526ca660f8b2a42e60d69ffd44e67def0fcf12
-
SHA512
49ad3a8d3a2ebf64c9feaddf916c2c20466bc355116177c81eaf045b251a2e034154832f60b9d40cde2b919e9d818bef3fc97588f95ab455af3971d823a1ddf0
-
SSDEEP
12288:Tzln6yWn7fcpVZlu/6uHKbRLj4+62FGPstWYfMXmxk5QI7O/125khKzwcY+Dw3:Nn698VVYeLL62F0+WGam2qnUkwzwcQ
Static task
static1
Behavioral task
behavioral1
Sample
52adc27e384cb4ae0d0e096792526ca660f8b2a42e60d69ffd44e67def0fcf12.exe
Resource
win7-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.diginetbd.net - Port:
587 - Username:
[email protected] - Password:
efs321##@@ - Email To:
[email protected]
Targets
-
-
Target
52adc27e384cb4ae0d0e096792526ca660f8b2a42e60d69ffd44e67def0fcf12.exe
-
Size
748KB
-
MD5
a7666685c69267f2f9108e319cd0cd38
-
SHA1
feac316461451bcaf6a64ea92217ad8046808844
-
SHA256
52adc27e384cb4ae0d0e096792526ca660f8b2a42e60d69ffd44e67def0fcf12
-
SHA512
49ad3a8d3a2ebf64c9feaddf916c2c20466bc355116177c81eaf045b251a2e034154832f60b9d40cde2b919e9d818bef3fc97588f95ab455af3971d823a1ddf0
-
SSDEEP
12288:Tzln6yWn7fcpVZlu/6uHKbRLj4+62FGPstWYfMXmxk5QI7O/125khKzwcY+Dw3:Nn698VVYeLL62F0+WGam2qnUkwzwcQ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-