General
-
Target
3bca6a73ff91184be4fdd602a8835350d7a802af068c9a04c8335293d7edaa9f
-
Size
659KB
-
Sample
240523-cj3pashh5x
-
MD5
7da99c0e15d99442a4d331bba4854a38
-
SHA1
0c53b88daf406f2a092f79df6f0fdb40b11a0dd6
-
SHA256
3bca6a73ff91184be4fdd602a8835350d7a802af068c9a04c8335293d7edaa9f
-
SHA512
bac28c5642af9ab2ff242dabbb6e91625689b5214133eccd3d40688a35ccd2a0a6dc99a6e1f613b8a6ee16d0ded07f0c2f08ae3ddf1f8bc04416c2381ebf9371
-
SSDEEP
12288:+lYifTZOwslcNo+FoiJhgec+DpdYDaDZM:Bi9Owsm2+b3gePia2
Static task
static1
Behavioral task
behavioral1
Sample
3bca6a73ff91184be4fdd602a8835350d7a802af068c9a04c8335293d7edaa9f.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.espetss.com - Port:
587 - Username:
[email protected] - Password:
误®cWsqnPt®BRTZ29zM错 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.espetss.com - Port:
587 - Username:
[email protected] - Password:
误®cWsqnPt®BRTZ29zM错
Targets
-
-
Target
3bca6a73ff91184be4fdd602a8835350d7a802af068c9a04c8335293d7edaa9f
-
Size
659KB
-
MD5
7da99c0e15d99442a4d331bba4854a38
-
SHA1
0c53b88daf406f2a092f79df6f0fdb40b11a0dd6
-
SHA256
3bca6a73ff91184be4fdd602a8835350d7a802af068c9a04c8335293d7edaa9f
-
SHA512
bac28c5642af9ab2ff242dabbb6e91625689b5214133eccd3d40688a35ccd2a0a6dc99a6e1f613b8a6ee16d0ded07f0c2f08ae3ddf1f8bc04416c2381ebf9371
-
SSDEEP
12288:+lYifTZOwslcNo+FoiJhgec+DpdYDaDZM:Bi9Owsm2+b3gePia2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-