General
-
Target
31e4af663f69863234fcf3dad00ff2da077825cf5e7213ec95f837db3af735f4
-
Size
650KB
-
Sample
240523-b8hjzshe23
-
MD5
f294616759b5f74b43435dbae3a5e945
-
SHA1
3f626b55e56a2ddb413cae83ac1585a79e345c8c
-
SHA256
31e4af663f69863234fcf3dad00ff2da077825cf5e7213ec95f837db3af735f4
-
SHA512
03080f01de76c312a9742e7dd94723d6dbb3e74ddab0a183ee0c9ca6ec465b7592bcccf72cfc45afb4b298904e4b2f2f936da78f6df91807776352bc1e767993
-
SSDEEP
12288:nGyvBMYySbMWfezs3MjehyvLXBwAs0Dk5asd6nVUZGnSseBCtC+HCq:GGBjXMWf9MjVTaAstqxShlrq
Static task
static1
Behavioral task
behavioral1
Sample
SOA Jan-Apr24.exe
Resource
win7-20240220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.valeofarma.it - Port:
587 - Username:
[email protected] - Password:
valeofarmavero - Email To:
[email protected]
Targets
-
-
Target
SOA Jan-Apr24.exe
-
Size
680KB
-
MD5
66228b6f5b149c3d52a20e0fa1b4ca17
-
SHA1
779371603043c8b5bfcd1c1b5d921cf974fc352c
-
SHA256
ac07c423bb0785b861795d5afdaa1ad0e433a6db747986ee3cfcebab6976f2bb
-
SHA512
e42cae6af4715e3a9d50f921704012ee2e7cd9a68ae7f43bc35cb3ec86c1e7771f69bd31c0cd2f32cf789647eb67ca3198674c60c6cb3410f60b1e79aef0224a
-
SSDEEP
12288:+RV5XBiMyStKGzeRs3MJehivPXB4Is0PkRaqd6xl8tGnKse/MdCHJkR:YHBThKGzhMJHnuIsDytKht0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-