General
-
Target
662fc0c1c151c2f950fb1d443d6b4ed9e2bf9e2d5e927f70f009527cb5524c7c
-
Size
667KB
-
Sample
240523-calz7ahd5y
-
MD5
2cf895235f1a59a179941ba1010f803c
-
SHA1
a5aaf0d4dbd06cca54001311e81de4e0c593d8a3
-
SHA256
662fc0c1c151c2f950fb1d443d6b4ed9e2bf9e2d5e927f70f009527cb5524c7c
-
SHA512
292f28aa8faf6fe89c7d5c3fecc9ffc8fe6954171bad62fdd93f2af89389f8720a69cc2ddf59b973f69688dc8000267c60d084ea5c344fb0eb6d40b43ecc0640
-
SSDEEP
12288:QdJeACZVyJgXKN/4ldBrJHelxaWca0nP+XFDDgffJfQLFWh7uxPNE32rM:QdJDl/YdBr9yxa1a02BDgffJfmWhc1+c
Static task
static1
Behavioral task
behavioral1
Sample
662fc0c1c151c2f950fb1d443d6b4ed9e2bf9e2d5e927f70f009527cb5524c7c.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.starmech.in - Port:
587 - Username:
[email protected] - Password:
gaging@2022 - Email To:
[email protected]
Targets
-
-
Target
662fc0c1c151c2f950fb1d443d6b4ed9e2bf9e2d5e927f70f009527cb5524c7c
-
Size
667KB
-
MD5
2cf895235f1a59a179941ba1010f803c
-
SHA1
a5aaf0d4dbd06cca54001311e81de4e0c593d8a3
-
SHA256
662fc0c1c151c2f950fb1d443d6b4ed9e2bf9e2d5e927f70f009527cb5524c7c
-
SHA512
292f28aa8faf6fe89c7d5c3fecc9ffc8fe6954171bad62fdd93f2af89389f8720a69cc2ddf59b973f69688dc8000267c60d084ea5c344fb0eb6d40b43ecc0640
-
SSDEEP
12288:QdJeACZVyJgXKN/4ldBrJHelxaWca0nP+XFDDgffJfQLFWh7uxPNE32rM:QdJDl/YdBr9yxa1a02BDgffJfmWhc1+c
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-