General
-
Target
ac07c423bb0785b861795d5afdaa1ad0e433a6db747986ee3cfcebab6976f2bb
-
Size
680KB
-
Sample
240523-b759nahc4t
-
MD5
66228b6f5b149c3d52a20e0fa1b4ca17
-
SHA1
779371603043c8b5bfcd1c1b5d921cf974fc352c
-
SHA256
ac07c423bb0785b861795d5afdaa1ad0e433a6db747986ee3cfcebab6976f2bb
-
SHA512
e42cae6af4715e3a9d50f921704012ee2e7cd9a68ae7f43bc35cb3ec86c1e7771f69bd31c0cd2f32cf789647eb67ca3198674c60c6cb3410f60b1e79aef0224a
-
SSDEEP
12288:+RV5XBiMyStKGzeRs3MJehivPXB4Is0PkRaqd6xl8tGnKse/MdCHJkR:YHBThKGzhMJHnuIsDytKht0
Static task
static1
Behavioral task
behavioral1
Sample
ac07c423bb0785b861795d5afdaa1ad0e433a6db747986ee3cfcebab6976f2bb.exe
Resource
win7-20240215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.valeofarma.it - Port:
587 - Username:
[email protected] - Password:
valeofarmavero - Email To:
[email protected]
Targets
-
-
Target
ac07c423bb0785b861795d5afdaa1ad0e433a6db747986ee3cfcebab6976f2bb
-
Size
680KB
-
MD5
66228b6f5b149c3d52a20e0fa1b4ca17
-
SHA1
779371603043c8b5bfcd1c1b5d921cf974fc352c
-
SHA256
ac07c423bb0785b861795d5afdaa1ad0e433a6db747986ee3cfcebab6976f2bb
-
SHA512
e42cae6af4715e3a9d50f921704012ee2e7cd9a68ae7f43bc35cb3ec86c1e7771f69bd31c0cd2f32cf789647eb67ca3198674c60c6cb3410f60b1e79aef0224a
-
SSDEEP
12288:+RV5XBiMyStKGzeRs3MJehivPXB4Is0PkRaqd6xl8tGnKse/MdCHJkR:YHBThKGzhMJHnuIsDytKht0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-