General
-
Target
d6d649c1f82d780b58abb3f05031d6881370299dffa565ee60326e420f1582f0
-
Size
655KB
-
Sample
240523-cthf4saf26
-
MD5
a792373900bbd7d8be6b38f98b9a8452
-
SHA1
d284b32cd1ba7319001853697981fc64ead0d76a
-
SHA256
d6d649c1f82d780b58abb3f05031d6881370299dffa565ee60326e420f1582f0
-
SHA512
03cf1c8baf55d4a9d51f66eb0e8ec3860b1e7e423c0d8781c631605545821105b1628a4d6ff39bdc6464c266c3e80e24ffb38004f44fe211ac999ee26be9567f
-
SSDEEP
12288:Eakyzi8LkpEaNGYBTc9xHjgJg4bc0876ctWyKa9ZSNzkik3+bwcKsPx4xQsdfXUE:fH2jEjsc910a4bhqxtWyKazXNAqmslEz
Static task
static1
Behavioral task
behavioral1
Sample
d6d649c1f82d780b58abb3f05031d6881370299dffa565ee60326e420f1582f0.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cash4cars.nz - Port:
587 - Username:
[email protected] - Password:
logs2024! - Email To:
[email protected]
Targets
-
-
Target
d6d649c1f82d780b58abb3f05031d6881370299dffa565ee60326e420f1582f0
-
Size
655KB
-
MD5
a792373900bbd7d8be6b38f98b9a8452
-
SHA1
d284b32cd1ba7319001853697981fc64ead0d76a
-
SHA256
d6d649c1f82d780b58abb3f05031d6881370299dffa565ee60326e420f1582f0
-
SHA512
03cf1c8baf55d4a9d51f66eb0e8ec3860b1e7e423c0d8781c631605545821105b1628a4d6ff39bdc6464c266c3e80e24ffb38004f44fe211ac999ee26be9567f
-
SSDEEP
12288:Eakyzi8LkpEaNGYBTc9xHjgJg4bc0876ctWyKa9ZSNzkik3+bwcKsPx4xQsdfXUE:fH2jEjsc910a4bhqxtWyKazXNAqmslEz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-